Analysis
-
max time kernel
138s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09-03-2024 19:41
Static task
static1
Behavioral task
behavioral1
Sample
bca4132932ccfabbc2069eecdeba05a7.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bca4132932ccfabbc2069eecdeba05a7.html
Resource
win10v2004-20240226-en
General
-
Target
bca4132932ccfabbc2069eecdeba05a7.html
-
Size
2KB
-
MD5
bca4132932ccfabbc2069eecdeba05a7
-
SHA1
7814359e822a1778337a6faf67e5593112fedfd0
-
SHA256
fc6b56a3b5df524fb56c9b23e6bc54c267d2c7d128ecdc6f95c981a8f1fbf002
-
SHA512
450117431ac1c4d84847c7dc022b6863e2452ab36cf922a57b35567b526daf12fc8cc1977819553ea63249bf2e6fbc78d9102ba6e46d613e6620488d9f153e63
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416175182" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000009329e944ffe3c3bb85a2210cd995b9dc70652c413d9b9e07488a87775d527e28000000000e8000000002000020000000f92d9c487341f16d4153d73b3317e733cdb3e939d9c86adf80bad451655f25ff20000000d583b333e0bac0717722b0b8c10bf542942425598fe73f2daa4a33a5c52b51fd40000000a9dbb3f52d01397da9b7b3d7cf15ce8d42043d9c209ddaab6a5d37f3a79438f8e05b817b3f936b34c480299a8f90a150968d5c44e15f9f58f4a10a6377df27b9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12B0AA81-DE4D-11EE-8547-E6D98B7EB028} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04efee75972da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2156 2172 iexplore.exe 28 PID 2172 wrote to memory of 2156 2172 iexplore.exe 28 PID 2172 wrote to memory of 2156 2172 iexplore.exe 28 PID 2172 wrote to memory of 2156 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bca4132932ccfabbc2069eecdeba05a7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d918c079e87e9d7396dfd39a26258626
SHA1d09397ed54c16811751c8ebf0d11f78420b96609
SHA25660c37aa9e8706f29046f545920e322ff31f76ee914a9d285bc9b74793ef51e10
SHA512597829e12e2cad4170083c21fd4e9358c5eb16fd0294c53a0ef350cc97b69e24ca8fdae8a7ebfcded5f0b8985acde02e5a9e23f478cf9a245d62b0158d51a415
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5036897ccdfb041c438ab3229dfcdb83b
SHA10cf98eaf0b47b50fac8a71224a461bfcdfac5c78
SHA2564ed248a7f3b267027402439010bfda27b05e5a669ab35b237ff77560694c78f5
SHA512d54fc4aa2c113c529f7c3b130a823e7c1a470fb1c49dfd42e3ceec37388bec2c50ea624bd2838fe248bb19a4a3ad763015f847c303dc23b4924f1eeb1f124d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee735b99a0b9226025a29c7466626b4c
SHA193ce0e40e7b436fa91e8bed4370752e4d8a88b02
SHA256674718809251f361077bc9cc69fa4f3784669beb7b0d8c7690421152c084f73c
SHA512b9d60350e3cebb1c57f1d24080f113d4a9bb71f065b64ab5017195a8f41716473fa49ef9bddb955c908b47626bd723b2d5b2d4951fb73e294b768de4bb886dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5414ccee325ea070ccca0bf28feffa032
SHA1ec67ad2d06e1cfe69588391c681263ba391ea183
SHA256d835fd836fcf1c1394b77f059f979a664be70cd4d62569a49dd2d85ee94eb693
SHA512e9c0593b72899dbae9ff9352f90d7567573d2ee32d98f0b630fb09839a3d34c002be6fb22d0ff326cf9f5390a0b09da4a22b41987f896e11cf20bb543c61886a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5870a86648bafde3908172af29c22c2fb
SHA125211d481318e9a9b9ff951b3572274753769c42
SHA2562d9407ffc208a6b441d387ce84d1f06034815bd5f1fd58fa624e1ebe02fe4dec
SHA51237ee7eb519e9d1c30d13abb6a124901fb5e51d5ce359030bc9d34eb62e2e0c26a93a32a467806422f8b1b8a0714e304ab8e42c25645dfbc240bd0f61a18bfe76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eba9410567b7ac4491ed23bf8e2bcec3
SHA10d0b829eff01bd2b6fa99a9dee68473b9b664ec5
SHA2563d7665c5f1e7df2e43d90cb33f4e07bd816294fa2e0a8838f1dfa754d77311a1
SHA51220ce17dae868313f29f0ca93ea09819c24bf0a4c38c502ecbcb81fd743436aa53f632fc544ca758886b37a8e5c71171d2ecf3368b7992e7deefe25758fc9e4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55473fef97e1e71989321802faa0af4bd
SHA1156f9435263c77fe17c3b9e598d6eb57cd87606b
SHA256cc3ea8c1736eb43dbb327017747451282c3041dc19096c38bf519d4934440a49
SHA512da3bfcbad3af43a584b7169e4f9c0b28116331bcefa89da87fae125634228f94fdc7396fc9328bb9ad1cff9225d3bd666791367d9aa031f6ba42d0ceb2af75cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558d577ba11e19f793ef26f3c63b0ed05
SHA147012a4c9fe6e9c282badaefa051215bc6f3bb9d
SHA25665789ca5bf1e31764fea92c9258d3de6720547c9696db74b5d91bcc84bb4d69c
SHA5121d8ee764566e42efd2d1672e368ef9d9b8a71f71f99f254a99c2269d1bc9122ce145f510d4cad09f804f60fc4c45a989f7ae2cd578a798b430c46e389a27222f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63