Analysis
-
max time kernel
152s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
bcb7c16722fdbbd53d35a9240a4fad85.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcb7c16722fdbbd53d35a9240a4fad85.html
Resource
win10v2004-20240226-en
General
-
Target
bcb7c16722fdbbd53d35a9240a4fad85.html
-
Size
48KB
-
MD5
bcb7c16722fdbbd53d35a9240a4fad85
-
SHA1
0c52990f537583f2e540aa9f0da6ef91da439ae9
-
SHA256
25e341135d4dbbd79993984144b855b41119d27eea252eeaf4248662b584323b
-
SHA512
3ccf01a0a70be2747117e3f2d2041803d0aebdc979732df1c1fbc829b4ea245fbb911488c1977e7b42da858ce4439442cacfe5aff0059e28c663c6cb6a29ed1e
-
SSDEEP
768:IzMGRNr6+boagGj5cla3oQT+iQUVwNu+YLU2S71:c/t5cl/QT+1uRLQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6D2F271-DE52-11EE-91D4-52ADCDCA366E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b021149e5f72da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c2306770000000002000000000010660000000100002000000070c2de39b0e3f90763839f94267258af1af73753dcf62a385ae3a85f29a662a2000000000e80000000020000200000008ee73c68a81e0c42e815f660396e31e846628717f45c4b05968fc5343a88a62d20000000c6b746aa3fd3c150b1eea0753dc30057c6e222cbb0eaecb958114f5e7de4798c400000003a8718bc6bc7e837dda130af342b1c213918879f743c1ab67260650ec50190dd87a59e9ed414b2a94714db6076bd6083cbd1691513328c9ac441ddbafd9811fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416177630" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1808 iexplore.exe 1808 iexplore.exe 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE 1736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1736 1808 iexplore.exe 28 PID 1808 wrote to memory of 1736 1808 iexplore.exe 28 PID 1808 wrote to memory of 1736 1808 iexplore.exe 28 PID 1808 wrote to memory of 1736 1808 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bcb7c16722fdbbd53d35a9240a4fad85.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1808 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD56aefb332dbd0b785fed5b355dc5df4a9
SHA1061498dc178eb31a66537506e2536696a98eda1e
SHA256ed30b06364f85f9dd46f57950ca2a8679f4a075e704ac7b9e13a20321774ac09
SHA512bc33645ee9a94456c66dedd3332ee998c14667a955cc8a193d80d1f1d9ec3906b564390d552629f24f70cc3a6403ef3b6ee5fffd27060d38732fbc61f973c5c8
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD54f617c9b67077544ac093e393ff59aea
SHA1633538007d20ad41c0b6858ea06e941c1f08448a
SHA256fe3f84486ae4e02b748359f51159bf7b4857b84caef0ce68b302ba9521b1ab7d
SHA51259700132482e94506c12e76ba2fc34a8eab98746aa47b843a11afa6b44b3669acc063ead29a569c6b99e6447116586ebfbba34b1573a71c2bbb921bb3297b0b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5937bdede24e8126c7aa3f481f149a1da
SHA1b394fa650aac294393b8943a189450604f0976be
SHA2565b19543f34bafcb5bdd0dced6a14f544e8007d5c1ffb3a3537199a921c35d7b5
SHA51271b30aa4838e72b37098b1eaaedfea11ed80fc5e63ea7eb9bef812cc7df0e3c897a21d8b4814d98de3795c13090852135ecdc4141a10215037bebbf884fdd799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519c6b3633ff4b87bd3c9ee95a3665df3
SHA1493ba80d07b7087cafc43e3f26f875c173e9ae19
SHA256db4a9d905bddd544f991449023f7b9b56c5438d678b8495355e86b6297058c42
SHA512ca2030bf399a3baa77202faa4b2a988a79918de7d6cc9a739a5c063783ab8a098c6b3e5a9be3e1950262023b451398aeb95119df01b788c9db63cbb0a0ca613b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc28fb83a382f991f81f578cd035edeb
SHA1604427500889f42aff7f6d2ff10686dc8d4d4b6e
SHA2567352c18240fe5605b2b71e82af1095950e2c0181245c9ece24c6978c02bda405
SHA5123b92d5ca5a19c386e4250e9a4f34e83df046d1bae494ce7d040fbcfc623d8a83acb2bf780939e1e0e92895589b550f930bd3d31bda5c19837c57610c7af39c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589e4c1bb08bcfb03b40815ad2b9446ac
SHA1bf8293081701694e7d30b69b2c93698e37a6d02d
SHA256f2bf8e3358f9daab62e9e91766b4f054a9303db0b27fd02593eaa2d36c451ba9
SHA512f558c5bc97f9296e08c3305bba1092515131135e6241773032b8a660c6192d53402910a9b37997de66429276bcd27988e070e1334d5d054fdff4874e1e72f1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c8ce1637feeadd929ce9f43b361329f
SHA14664602c051a27f301e39eb62ce7664f318db03a
SHA256f4cd67dee89f779cbef241cd67e6a5d316bd77e4419231c9aaaad0011f891269
SHA512a638508fa36d39ccc6bc7bdb655eda6e706eef3d0b8f3beaa8679770b150fa2c15c5c235395f213cc731172f008d18f50fe3e56d09c5815c0598de2d6af80206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d39883e0717d35911e58c50f14516c14
SHA17e49b3b19cbe1b09a5085eb974ed01ad7d64821a
SHA256d16aba1d7e6117c9a5574a077f23395252ab6ac556a784f257f1dc4ea873d7d9
SHA5128c84bdcb81cbfed602da807a3a7f322364f8a13b93576eafa7c88f7437e59ed6c96846788205f326871201b947dc7b34c9e67c23665f511bab4cadd8f5209911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500b91d5b9af805f1da0545c81b1b738f
SHA1412b8d9bf764e7d2f6cc0c9aafb2413df1216be3
SHA25663d8dde360bea637933a511c9c4e390aa5b9d8778aed2dd88dd3c4bec466a455
SHA512c563c35e2fd35203b8d577ebf8cdb8d6b47e8404f64752a6f5355b817d4e5ab7972c8ed825b38da1cfe89ab3f86203c7612f244cd7d38f2dea474ff9a615d5f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b4cb1bd10d4b55307a5e97b808ecbdb
SHA133cb08a0d95293f084e55b2c78ce86596d5c8d83
SHA2564dffdd1f69a47f9f8419f5d29cb6a9cc95b5f89727edb19c157cd9256e29709a
SHA512625f96e57c2d6d25994260ae6da0ca0dd76243001d5e98bc69ca4f4c5dab8aae71cad17a8bde0e343b5a0d325e5ab17b9c0c8cdc71a9764cb08f50cc288380e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7a20da1f5e3a6607a6dc045ed934f6d
SHA17b6d218657f59f659a14cbd70af5856ba7972351
SHA2561d42b6a66a340300d3fd74193177c8a6533406947630d7c0445accf4f45f3a4b
SHA5126b8d2aa47d5080a85fd2be80a33774d9e6464017f0011b3cd4ac2bc36a1a4e33c28737136b42ba4263e74ff14270516819798b0e2ed6bda3596692e5f9d42ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597948688e5c313ee45a4909d9885fb58
SHA1ed61b3408d4036cbb945c92c112feb61850b10da
SHA25617e7c0baa36686f62378bef6958fb5afc969ef842ca2bb5751ff60b265320c06
SHA51251765350756744e5af6417ed15734557b771db7b846edcebdef60c4cc3fa6f254923d7cf8b81615f5b52598a897256f206ef011683e50bef4ac684bfe95adccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578294ef505dfc1258eb0a4061a836231
SHA1ac160d166e1dda795c75114e0c6728e150cc5631
SHA2561d501296627cf77371bf0cacf9bae1d27d2f86deae7a6695624f955f4fb023fd
SHA51216979258066d24d8205663ae5a364eca0c882d764d508a32459085c3e37affe3868b964858c4968120065d897e174c37db34bb72ad421a5063fee45fff1a6f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5097f7a441186573807cf6621b1d940ff
SHA146f6e521df3fc72f8b98783f8f396e7a86e99d42
SHA256eb326472179c5db05be3abbbf021cfb12dfa9869bffcc8ab93cf943d4175f8d4
SHA5121a1d5d63fd2ece0c29946c76454270d52aa55a9efd24e609b1ffd42362e33e272541eb10dc5025a3b0de47c3ab6325e9fca0ca347d76c0af02cdffaf2772bf80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4b45154e178ddaf5318dbd8e198c36c
SHA14ae6b0eebb811505f8a6c5029d7cd11f3a54230d
SHA256c7213ef10f7de9fb9617ba30a9f6f258cd7843256224733e91b092373d8fa316
SHA512c1f910cd671b545d8b7ce266b4ce77348de8a6676a6e387ef64d7360afe35aedec638c71c2947eb31d62df0e4151dac5cba82df693682b1951e8f28b574f5154
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\23EIUNT7\cb=gapi[1].js
Filesize133KB
MD5c8be3350843695958a33474aeb3ea8f1
SHA1ad92694d9b189ee479c1be438636e39247b216af
SHA25622494eb4f5fc2ef8c229b9df2e171990687e4837282655145cca0fa302af1278
SHA51254ba5d4076fe9fe4c4ac22f45cd7d2ebb4e8027d8b8f82580436dccbcd60fa2adbb948ff1234d9912c663bf1fb33ac834007850f5a3f2abfb96a7a4feb110bc8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XJ0RD6PK\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5bf78e91c4b8c660626008446d6d30703
SHA1db09dae5dda987e24027a540e47650cb970e31bf
SHA256f554260f317f497231227b9def0144f0bf370ae71cdd7a54ac60d0ae1a56e096
SHA51215cf262865ed7a9aee617939501430586460eea04599e7c09f5b223ecbebf454450e9e6ba93b81e6e1a35b1039d0e80039bd4d4c768dc72ae5e3bb3ca1f70fdf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63