Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
bf04da78c345a2efd82512dbc42e0449.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf04da78c345a2efd82512dbc42e0449.html
Resource
win10v2004-20240226-en
General
-
Target
bf04da78c345a2efd82512dbc42e0449.html
-
Size
106KB
-
MD5
bf04da78c345a2efd82512dbc42e0449
-
SHA1
7650640eb56cf261bdb31350da54bbb85b151ace
-
SHA256
d54bdb75c1b92ad2a2a901a7fea5bce16cb057b27c8fdbd0a4781118efe68cc4
-
SHA512
c3cf3dcafc530fe9ee17c7ee5cf00fa7d6c2225eb0456463dd2b8a6484d215faf315fc700b7aeddcda411541cf7e12b24c382ab34c8d193c35b697a8443bb1ea
-
SSDEEP
3072:jDlL+0K5sdtCMBhWY+bYM5dSf+A6DtD2MJuUZgoF6udwSyHy6WytDYXFwsYDmkS3:jIjWGX
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9649BF81-DEF7-11EE-AFBF-6EAD7206CC74} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416248416" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f700000000020000000000106600000001000020000000af617bdd6f0a9e2e8a75fdc8b307f620655d5204dea53da6283a37d8c568ca24000000000e800000000200002000000077fe89e2ff29a636a30f52e2c93ae09811100530ce530bcb0f690ef05751c45220000000552f3367e3eaee4fc15973822882a51927887451476632ce5247c7fe0456a53540000000e7bcf0ccaef566ba8ddc38ef9e30da8f022c32b1fdc056fcc81a7f2ff1a484f73ad39596d4c82b402bbdfacaebe729a5865a211169dd50278d601532ee64acc9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0a7c56b0473da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2912 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2912 2040 iexplore.exe 28 PID 2040 wrote to memory of 2912 2040 iexplore.exe 28 PID 2040 wrote to memory of 2912 2040 iexplore.exe 28 PID 2040 wrote to memory of 2912 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf04da78c345a2efd82512dbc42e0449.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e36b592111a56d0ec8bce56ea46f91b
SHA13ef092dc8b5ff4e7239be3b77c867530f0200ea8
SHA25660109c977e1ce687e4caea835110b68be385b7ed461ff16c2d114a81694c39b6
SHA512007e6064f10363cde4e0b46007c8b7ce05e982ad5d778ddeaa0305384d44f9efe0bc7666ea2a3eebf4e78162150493fbf3c6594716162c507dac5f3773f8534f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58de87c35f7b17cbc1bed4ac75abb27b9
SHA16c865c856274ecd3aa068318ef13830f98d2ee26
SHA256c61b7c6d36e0b0a87f690c68482d20a0f1d40354a5af73100412068e71957e41
SHA512122bb78ce24983fdf0311c2d6bbdd3a9a5ad2645e6adea4b09d44cabefbb9e6489b269710fb6da1787c48398c23a747e6aed13558faeaa1c3271156134f7fac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f81ac1a73ce67defc61a0de9b0756f70
SHA1ee2f6146ca15c4beeaadaa540331b4899ec3b5cc
SHA256e3d4a7f527c0f9fadf4d00cb82ddd14475c3bf0a3a3cdd858d9f3b06b31d817c
SHA512da34b8e6f1650952c8c4b5e5a2956b99660babfa49b64eb8ca3b40566c8304ce644f048a69087b24dbc6e230121b0ec9d19bc04e330a4c0b0d0eae36f70a9620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7eec4a13e9c7a4872550fc92d2c7194
SHA12f16cd298c104d4a80ec697e8b67855e2b6030e5
SHA256465e5a297a843e669063e141947cbe2794821a726fe821317f1458f5ce5f3777
SHA5123120638ccfaa2a2e2097c79cd3f03e823451ff202d9cebacaf4084b93c2ee2c7b1b2a322f4a49c862d900b92cec129ea3880359115e179cb57a377f7a8c7713e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fe0e286ad97ec4b6d1386300e08c170
SHA1b912c2cc44aa68ae294bbb4987b484ed2640db1c
SHA25636213671eb95c353721739545e553539b06615bab3084eb23e180de0d77748fb
SHA512acad8de695b5aa146f1bf9045925160862935e1e4e324046d80cee5974a5b0e790507bc7367f8656a42104ed450dad0e6c9af89d64c5c6d269be1435677c202c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c37b8c360ac33cafec5edf0503adf91
SHA14fdee851dc6444cddaa8e19a321c47c224122fa4
SHA2560c2e119b6d28f8625101840f7425b2f64a8091b5a79e57cecf62686a30e9ed77
SHA5122ed2a1165bcca49b5552752a3e12f8c3a90bf32baa9528692d3d0474513cf69cffd3db10b572211deca3feb0bc62ba44d5b9eb97a483f2286944191eb398a4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c1ecb0a840789927530620476eed90c
SHA145b0e747eedc735b49e06823ad6cfb5bfba6140b
SHA256e27256d093c5110bb2fa71a0fa901f493bf7890a117972a48cd1b50b6cf01c62
SHA512115605c87922c5c6ac789463a5f4209fdba119dc92e37ec6876db9b2f9691ac9b789314c6b4bb5a50b99b32266e6a072efc9f45da601b37e07606d76ab745f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d90f5d8f9eb59720868a60d23c3ec224
SHA1d3abb0c1f8571b01c5d84dbcf75a63b43b29943c
SHA256b488398e1412cc2373caf6954a3462c07537ce1e9ab65cfcc396ad9cd8a6daff
SHA512802ee29be66d3bb668455fb72bbc38b6d7858633f3b66016055bcce1b702273ec5fa8be07339921764ebcd4326653d8d2f0581ad9a0775696c0c71572b9d77e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547c9d592d7ee2ba67bef521b7feaf4ea
SHA1c33738f55a7b76842d75e7894883af6338bb5a68
SHA256f73b8fd6ad725f1bd311abddcf5a392441bb5d63d0c1243726306c45453df64f
SHA512e94d6b26fe607fb551535fb80411fab14bbe665dde8df26bd839b97e8e5ae4726880c7b5c3226445bd0d826ef04c51698805c3b2dd57c8fbdd5052ec2029ad95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b388835b37ff00157a152e11ea8e2a8d
SHA1e8fdb1df3dcc312817ff2f1b75bc781a86c3d4ac
SHA2568f6a0db41f63c965b3e47008241868c0df2923a0a8da4e5604d97f3ec8a450b4
SHA5127f63383b61755ba9ddad74749aa720ac8e2fe8c82753c780f37d9323223ef37a50e9ef33a68b04ce7bf007bd18dadaae1bb9edc2b42769099641da92023c42aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e663c60b9bfed1b6375f262825203ba
SHA1fcb9d3d81740ce04ca8b21174f1dfb40dd9d38b8
SHA256b19989e3c1f9d64a930f77f8f96eaa74bef225a66a03e77d3da6452d50e8db42
SHA512e43fb5c4cabe65fa7257188386a9e3df0e970deb1ac5bed39bea08d1370ea183926935b586d0fc40fb090a0d119f1d66e82e940c6f60c146ce74cece56ccca73
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63