Analysis
-
max time kernel
122s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 09:51
Static task
static1
Behavioral task
behavioral1
Sample
c0497e7f0e4352ca6ce5a7084c9c8381.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0497e7f0e4352ca6ce5a7084c9c8381.html
Resource
win10v2004-20240226-en
General
-
Target
c0497e7f0e4352ca6ce5a7084c9c8381.html
-
Size
601B
-
MD5
c0497e7f0e4352ca6ce5a7084c9c8381
-
SHA1
634183f3c5a5c7e58b00de1662c0a5197326eb94
-
SHA256
7a9fe6815cf298b019a452c06a5a31977ecf343a0ce6498ac888f533d69781c0
-
SHA512
d843c4936654191c25c8b24ab250a2fd430716ce7f4c55a727f9f0def915aba790686267d4a9e0600474d1c670c78752c14409e0c1059f8aa6f56aaf96bf6c12
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b5eaaa9973da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416312552" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fffacc0240230f40b575ac5982df49bd000000000200000000001066000000010000200000003bdec9220f09f71bbd4281aef9236319ce351a4e7c6bfd17abc8568503d74346000000000e80000000020000200000008f09be93367fe1312f3f68ec4f87672520033aed6c4ff8ea4fb3dd645d5e12ca20000000f5b62b0854131662570c3988caeb17c08a7885fde241361019c575d261cf9f6540000000259e5ae26f4fc23f7a8815cfb447af5fd7e249667fcc2effa321dcb700e8f9dfdb30783ba7758ef79a418e8e5db7d4c2d0e8272c1b0eee0347083326f9d66ff5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E58583A1-DF8C-11EE-A71A-CEEE273A2359} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2540 2516 iexplore.exe 28 PID 2516 wrote to memory of 2540 2516 iexplore.exe 28 PID 2516 wrote to memory of 2540 2516 iexplore.exe 28 PID 2516 wrote to memory of 2540 2516 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0497e7f0e4352ca6ce5a7084c9c8381.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a684a79ad10c731b8710b21f6ef3409
SHA1d76f63405ecd6cfe9bac9bc0d3ae220302d05fa5
SHA256684386fcfb877f74beabddbcc8c879c864ec6e94004aa518d8becb82a3753ea8
SHA512c491516f8d7239bce3e278bf2afbf8f8375681cb47aa90ff043abe3151b349d62bd334910d2dbb0ff91d5e37d405a4c3e39d8c4c0c196614c8b57675275c4db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e13a8ae2c78d89c31be3fe6de2c0e8ec
SHA19663139b269a3a485a1f7f98560a35400d6fa3c0
SHA256feb8db977cdbac6f86d19ee248c574adfbcdc35f8ef2a778c0b943a2471cf15c
SHA512816a066bb9ac529392e66af41145f3f8b89bc4d7ecf05ca3f04f2908ae94554185562cd76acd238c3028edec1f25ef7b43d66dd29faa1f0623fd47e11d28d4db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1dfb096799d8e9a535202c0ba98dc18
SHA156bb9e0a48ff28399459bdf2dee45e048b5c394e
SHA25637235d732d4d7b54651280266a7e56ba154b5992e6632554b6965e8a4cfd11d9
SHA5121419c65fa13c14885fb08209791552081ae3440dfbdc1405472b1ec00de7fcce2af3da05fe123e3688591affd88e7eae266c63fc1c62eaa6ee124e86a040d109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c69bdef652c84ea00c2a1a8847874762
SHA15c9e72849f313fc320be8b2fa5d073fe874ecdcd
SHA25678689aed645902f8cf630cdce981011eb890ecbbc95ece7c357ef5578dd2cda7
SHA5121582125574d1a737784b6d0a57da9238fb99c957924f1489a5e2ec12797dc8099cd13243775d84e05d0f2d6c18f6f177fd668bc9b5b1dfe011ca6562304adff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56688d49a7fa339bcab757bf7a59159c4
SHA14acd104db5f57a42da8fc59cde390b4b9d4fb383
SHA256629938ee4bee9d10f00e25a3e8dc1856e247a307b09c8f674dba791e04e101d7
SHA512875f447763af9adb75697def202d2c803d9ec8d55f4a5d0755ab3c77d0baaf1994e7fe3aeeb2980ec12b8c1d666d9f5281d24407dc9b8dfc9deac6ed9e137088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e825bed9033e3d946f716dce6c4698e0
SHA1390de760b8af61092a676f5c13e553bd977a0781
SHA256d0653f8b17b6de2a9541e2f38d289bb829e8a8e3a24b5dabd71a6aaa4a2b8c4a
SHA512f03044fcb8691a6fa368cc09d44509b83e902c6ee70df1bd7524f812e15036cbd6b8994b9dcf25131fed87d40ec006074ee979c87a8da1f310b3869ce49a3493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1cff63220f07d2998eeb400903ef94f
SHA16fc785576ef8eae903b9cf1025c01a9d6eecbdfc
SHA2568e63c623a3ff6b6676e98b230144ba8c381ff0fb3e715c504585c2fe31066b5b
SHA512e58a03ccedfecd2a96a3a41d6857a2b94387bb1c1526446f360031f3c71d051a5f4e108304c61d39b2589afe5204664d79f10ba061a745b5d0e931a06f50cd01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c50b35a94f122ae20095dc3144ddae14
SHA10d568eaa44782bf18814f2900722d54f903fab90
SHA2560a0b6feb5965f5e355f37f95f863d21389ed6fab0ed8e3832e2a0bb1896d5a11
SHA5121281fee68a4c8bd78f3764fac24fa8226ca7814b0380605040b24688e916e75c46853d9e0edb9ec6f59098ff2588dfb004fa5696e412a278d21d2f6daf783d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5368fb368dabc4fac7206a712d7aa36c7
SHA1d6f7744cb357e614acf583575be32a3c9c801416
SHA25686f0f720afe3a01185bd77671d2a587b60b5be1220dbedb35bc78699d0be6c97
SHA512568fcfd0a0254a9b4340c44783005ca57ad3d41ea7bba0cea3a99ea58d612c5f1342ca9a2200fbc96bf88c3c2d247937bdcf2b62174355b82e50b38b3e873b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbf857472eef4aa04bed90266aad0cff
SHA1b022bfbc2bdf3e2fe3b01ea3c5d4bed4e1007bdf
SHA2567aa95cebc76296206d1185eace8d8ee888ebb21b8dc0836eaff6e90028f886ea
SHA5124b7f62eafc8bfbacf5d613b2ace4e9f77af057bf69ff0a70c18dd389032eb34c290beba9a27a5a3b2906060503c1f998dbf1f7e619bf122ec8a65b28eb75c545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b64f6ceee900f3265d2404929ef24736
SHA1df7fde99b0f16455c880da54d6ac178726008393
SHA2568353f05e8455ffc6ce6c7fc2f745a501b610e7c253cfa9437e21ba4586066361
SHA512487c93c0bf890355ad2859bb2cc329b8c6a06db50c341fe4c1f0248059bbfdc2dbb2cfb88ecb82282c9052831795635c3233c346e8f6bdbf9dd3364caea0f26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcf80610ac9da42981d7089c31dccd21
SHA1732a88dbbd9f17cafa33a93cb59fee9c65b6ed08
SHA25680503c8770ae026f6f02def07364995bebfd7534a8c045a33022e867c95f7bcd
SHA512c2f87071be9f8b87c49e2647fef3101b5e418b2a522a4aff59d223b27eb9d29d03941f9847906840480385766e0440be2ee10e175d11d940896df0b6c5beed4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509316f038991e15f18ab2f48749832d8
SHA18bb911534555c13dcceb14c8759009a04635d730
SHA256bcb1ac806413513d3d445f1b6ac8af2bee9345dda6ba88c390da545ac4b9fb4e
SHA512b597a72d4072e6dd619b2f16ad75aadc899a0395fd29f29accff3ea0fde72c739a89645d1812ee25cfbc94a85345e17e65a9dfe5836183ce6ebdc781e64c3414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569112a47f7f6459101d5083d47dafaac
SHA1a662e1dc7de63168bdc2aeb4b72fb447b13afb82
SHA256858b18f5a1b64ee972e34851e16643dd354a3aa2b7577e6687a800ee44dfa483
SHA5125ad19dc530fe271a9f830db207162f7cd10b15148169ed817fe4733b19819770a7e06183572e060856e7fbc83e9209c718e5f28371485b1260431f285e1e8f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acc8cc5a29cf34a01f8269d696de0b38
SHA1cde7fb90744bcf9f966935313e764c78a714b4cb
SHA256da6f65562bb96718dcf4df7bbd18b1934b8b23d912d98a32397bc2b58ea1c4ca
SHA5122d8cc28e68fdb7d1a6426cf68d46446002767da1efacfa642da3523d0ce06e2d6bf0221f796704caf27a264879ce84df07ac58474c94be513983d101c44d532d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea855aa6834a405631297507c037feea
SHA19adc33a2cc5031565592dd8977e8f3190a1a98a0
SHA256cca598195a9c40713ea6aa1860c2ccb333b4506780f6c0a1f15a2690130cef17
SHA51273862bf583a7792b0916c87c627dc6b7ca120adf3371bf713252785e4698b7927a1aaddd4e2e9b7412f60ec49e3ffa1294eb2508b3810eb61de7beede130e429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2f0902bbc836bc8efa3bb80ebffc99d
SHA142574c1f39b2677276d5863b02de917375e24804
SHA256702d2721f6212ccfdee15749e77a4eda538faba73abeeef9fb69d38c52bc151b
SHA5120d8511330136dc3e3b376a70cea3dc922bb9e08996be1b6a63a65e45218ce213ff1ccfe774f1107efdf308ea2cc215c87284748a81f14c70b295ef94170efa52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9626415a29fbe5a79f978de7ef17d0f
SHA1cbe593e401a46f19c3689acbca3446706fd5b9be
SHA256f457d6df224d7627565947ff33c7b20a73fb95f50876d5ea53fa4adac0a66fb6
SHA512aad1cc4a474a32bc20a75eb104b42f22fb2ca938c15dd4cf7a7d1d3e377d79bd83e93c3e0431b5fcd2179dbba9a50778524441ea6d16483d6610cb5b04b92554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545478a4d9e43c573f14459aecbc5a72b
SHA1510227b64b60e45babca008d498169d3847ad0ac
SHA256d3c00a4325756c4cb61566f2dd09884c9606cd7030541620af7e3f67170bf037
SHA51283dfcfcf0783ce25722ee96aa01305e0cce29161302cca18d3702f5595ea88fbdce96b5c73a6b8dce68996f4e09e3ac1f7c6acd978c31c2ad6af349fce7c76b5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63