Analysis
-
max time kernel
122s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
be6019c7d87fb89cf5b745af35c7a720.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be6019c7d87fb89cf5b745af35c7a720.html
Resource
win10v2004-20240226-en
General
-
Target
be6019c7d87fb89cf5b745af35c7a720.html
-
Size
6KB
-
MD5
be6019c7d87fb89cf5b745af35c7a720
-
SHA1
d68c1b328b21382bca80e07852cac98fcf02ad9e
-
SHA256
e33621a3226bd805b99928b5d958b8871266332c3f56f468853b68bf7b6cdfc9
-
SHA512
a29c30965d4c3449dfe07077a32a0a1533eeaea7af45a3d03ef11ec88c9a17c9f426bd077479d36787b98805f8e7ce923cd85bbbdc15eaf03f13c25f335a075c
-
SSDEEP
96:uzVs+ux799LLY1k9o84d12ef7CSTUSV/6/NcEZ7ru7f:csz799AYS/Z4Nb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F83FA491-DEC8-11EE-B9D8-EA263619F6CB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af600000000020000000000106600000001000020000000d7890baa0b3ab934c453dd9f27b2963929dd3dcefecdbb0b4126c9e77e85cd00000000000e800000000200002000000061d5005fde9a259fce3c6da9ca42b893e196d9c846c2967e90d96e0548c9f2832000000019d32fd3bedf7a0d1da5ed5d58cdb8db7fa3cf0023df936e33e0c5d8656ce58f40000000c105aa66e0202aa73a9b981fef9ea0c467edc8974d71ee6d64f83f60e8af5755ff673288c99f93aa0ad2591a756d74896b2b5a2998cb60a33bc8fe143b71cc43 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416228395" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 201930e0d572da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2092 iexplore.exe 2092 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2132 2092 iexplore.exe 28 PID 2092 wrote to memory of 2132 2092 iexplore.exe 28 PID 2092 wrote to memory of 2132 2092 iexplore.exe 28 PID 2092 wrote to memory of 2132 2092 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be6019c7d87fb89cf5b745af35c7a720.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2092 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b2c16762ac7d7d4d87da3889001e1e6
SHA1e62aab7184c52f911dc127db1d3867c7452b0e7d
SHA256e1f5281125007f17c2c1ae2bb1884e606f74586419a9b94749a8c1022bbdab65
SHA5125268f2f6a6f62dc951464c035a6be05a445a180449e3dedb7ee85798f9fbd92dc9d9d275031970166afa17edeb89d4c7b92d34ee5c1a05736800f0350a9be80e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e80d46552ef4ec252f7f74a0160fa150
SHA15c433ad9ae3252f0e0797072322bdfc2cb69bf67
SHA25634cc6f478bf2831ecff0802c6fa14c76c98e9a04ce6218f2269b4030dfb4822e
SHA51221a911496ed651ff57d12380fdcbb3a627b211cffa08721ec7d83ba720a117ebd95bbf3f6f81173a69389e4c2dab89794c6d735169c541f675522a67c7b4dd54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a622bba513a51974ebe84dfcc524825
SHA186fbce6703d1cf1e89d627d8eb4c6062a68f9f00
SHA256677abbff381b10c039d7896fd18279323e7a78fceb6df33dd7300474a22012b4
SHA512bd89a93c026e0bd6b38c284dba88aab044c51abebacd6e23a8747beafc8f9de125aaf7268511f564e5861e7cfec93f873829db4941e665ec73549c39a4bc551f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f4e6e7c4d6aea18dbf6fd465e81025c
SHA18ec5fc49cd23d17ac97e4abdf7c23ff36bdaaa78
SHA2568ccefaf554e1afd2dba8c1095c3ee01c26b3172d8282e26ef65a346e72d9cb2b
SHA512fe01d2fdf550cfbd740f8827a9c321a16b47cdfb63449182075c2faa8c81336c9bd14df199257061ccff184f8d7f28824ffbf04115cdb2404ef087e638fbec2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ab28b4e1554000c81ec7a88e9b857b0
SHA1388ebd823bb2e1885832b7acec5f9837c09f19cc
SHA2566ae0e559f497d6ed9779d7d99314c0874692ea3756152e2f4ba2dc6fd044339b
SHA512b63de211bc9b1a2473872e47505630397554bed0d1e0e29d3d7785e1a32f22d2c0ae8a413de4ab833b4a111d13025cc59ecd8a8fcd3a5eeb3d989780299de949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bc5b639a07ee100ad9b80a8d9a5d5c6d
SHA178c54f6b4f74dd6179bd3334fe8120cf0bbf3e31
SHA256d8c126a6bb100db9b9f40f8b88f38201a0fff4cb3d3db5fc80f9fdaf21e94944
SHA512c37e8b5df6102d445dcbb8b5c28cc627d3f8c3bbf2f5a24aca7daa1053438a73695a4e8654b2b21886137242f8d2d1642fbf8808a0c9de75c901bc0172b096f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec636841dae3d90dbd90978cc01feacf
SHA126bebf1dced052de0b83b7cf4b37d7e7349bbbf7
SHA2565cdb5cedd0d771e0b0fd049f105d0c6c0c9b3678a5030655220e6a4afb49f598
SHA5120de3267b12d680a14b32ecfff4b94c386757e374b049f6d00d798eceda5511ba446e3be2358e373df0914cc36e07d41e3efacdfd6c2f60648658b127f2d3a807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589eb8026b37ef0d35c01376e3f19bbc5
SHA12d2016bfe857e094c668263507f6c5bc908df511
SHA25696c01b54cef5836c61e6fbaa916837ff825ec935c6163bd0db64f8058b4a15e1
SHA51215d253807fd5a8744c4cea8ab72d883c25bedfa7eec0153030e80d10041f022f147fd28140a15265219f05af74c68c49871ac988843be4572ec3177087ecbe97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3c52e16a4cb8dc0dcf5ad17eabf143a
SHA138bbba2af1b759ef589499d0b6e6e26c3ab1d2e0
SHA2560a1a592be579b291fba4512f11665d7e321b03e336b97e2f6a02bf42c91f0d68
SHA512a2bdedb19cdf81da6c6da5ca05d566dd235e4ac9235e83e18b1e83f8d7c900177c46ec68c6778b465f395390ea98bcf1c50aa7f1e9dc4244b6746a638b2b4c2b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63