Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 14:45
Static task
static1
Behavioral task
behavioral1
Sample
c0db6ecc661e2e75ead5110b5749e708.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0db6ecc661e2e75ead5110b5749e708.html
Resource
win10v2004-20240226-en
General
-
Target
c0db6ecc661e2e75ead5110b5749e708.html
-
Size
3KB
-
MD5
c0db6ecc661e2e75ead5110b5749e708
-
SHA1
84d77bcf29d8d1ea92b2730f08234ab822a99b93
-
SHA256
3a722553021fb19b80fb374da98f137f09f2c76c221a0432f64492ac4073f147
-
SHA512
493722d9a46cd9cbddaecd24d5bb995b6989a5510fb5a65a19670694086f214ceb29475c1034c374187704d1dd538835df277a78f87161253d471085fb17d61f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{072FE7B1-DFB6-11EE-815A-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000b8da57e8e70fb99910b8bdc6e351d2f8d77b916668f820badc9d3394e14a01d9000000000e80000000020000200000003c39b3a9f07888bc30c660ca9ea0f0b0ffab6f89e6a231ffb96a15b8c14cc935200000004e0e9d2f508732250f2bb5cf73fcc1d04ce5a94bbbd8ac1b6144254e200fa7bf40000000d7db2e180368b2c239e983f9873088fba6df83297f8fa134c51316f9954a637aa8fae1ee68582facd05c0413db15e914fc36aca949b2a59784e91556ac1d5b5a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416330209" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08cb9dfc273da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE 2252 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2252 2244 iexplore.exe 28 PID 2244 wrote to memory of 2252 2244 iexplore.exe 28 PID 2244 wrote to memory of 2252 2244 iexplore.exe 28 PID 2244 wrote to memory of 2252 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0db6ecc661e2e75ead5110b5749e708.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517f21a6cca91378cb19dd5ad05aaf7e5
SHA10ab62ef0b4be8ac1d1245a09177a100b7d46d6e3
SHA256fb5d335e0024820f4952bf690daafba3fd3370498817f01240c0cd75d021be3e
SHA5124c658039c86b60c91471dc24e4900182b6ee6ad77539ff67608b2078ca524cfe51bf40b4f70580d3a7b0b03b549b5aa3a82ac39742505663714fa497b66a15dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d056478e6f957b7c1a4f2026216bf5f
SHA14e693936e90566ee907ae1ec585b2386d5da8261
SHA256a16468026fd36134032e679fe4cb5b44fd8e97f7cfffd9cbbeee0f774e58e3ab
SHA5125fdb97303ea74fa09cb659cc1e1bb4e7097be1816a7c59841cc9ac0007f978bc7846dea8cb71a8c0ce7279c980debf99dffc4b94c1d5456f4d241adb46685ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf95c6f2f7a0cbc9a81447ca2f2549f7
SHA1d5ca77c3c5720b80a8c8572dbfa3c290f48d616a
SHA25638a2f2a6b36f34d6cf21f1c0968e746535db14ffea62a2bfeafcca8bdd74b602
SHA512852e15589ab6bb2640031fce4a732f4800b35bfde7a9782901f9976607c49508ecf42859be5ae8152e3b5e221610fc47afe8e504ebf83189f0e0f11b8026f343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536406f886a20272c2c9f4b52ad8f382e
SHA169bfa0be45e2ba48e2d6415aa24cdc55b8f9850b
SHA2565584342974fa0a4362634f3b959ea2a0862c635817231eac7c2f2b2090ab6cc5
SHA512a70ab7c972075fbf825c4a8278e1af7fb18f33ad93a8babb964774b0bfd5f3db760430d72180583edb9e1831a3415f3d35b5a7dc468b97829f07c0f8af580bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b88ea56b9bd168d32bbfff097477e527
SHA1d31c16e361fc74ef7e4f37312ba3398c5c1208f2
SHA2566ff4a3699b0ec226c8bdb29876c1f96c87eddbc18bffc7535602e2e6032641c6
SHA512e8d355b64c00c958aa5838cdef8304a4ec6f411192b6a560bcacbd7ca9000b4f090494252e03a3cadccb12a10cfc7ed0ffbc8125cd8de50d06b612f175fd0e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53866a712ec6f16f96f6dd874e1ee2902
SHA1e9bbf801704137481d3e31a968c06e13916c44dc
SHA256af7d19df3214e91b0000521333b0057de50c983d3bae348b075f9825b213cf09
SHA512b3b7e1e57c40434852e0528c7b8add49c05fdee8bb3c09239ef7e23a159108d276db7fcb9a650fc1f7fb4f9889630488422055969d341b9234dabf3678be1c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55153bf38617eb9be7f8150d9b5ecd489
SHA11946f649d7e75d9c093483725c8b4c4dd25e4bcb
SHA2560bb92ba94cd6bf074c46355ab4fce1d82462491a7631e77af5f4839bcfeb5a71
SHA512425905176b65518d214650a3d73964de8d10dcbec1f4d2a47ea98ca87044fcb66e0f8fb9365d6542bc81088a7f0d7d83039b63f6a2e14ae74cfccefd58f97e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5491f98976cf29a7be9c946a1fd34b3ad
SHA1ce426361ee3428d71549d7d98420d63738731ae2
SHA25626f460edf8fdb1ad5b346052405eff4cde1572c2516d4915b7f7a50d8f762e82
SHA5122e0be8765a4e6a5b74d2523cbfaa088db556dc7c90503c2b261535bc3782433384304523a41385c6feb69ac20d55d8de9604dd55ac08b19faa075af90e3c722e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cb7143b32af769cbf34303ceeff9a6c
SHA1546f3fa4f5277669276e8ec4bf2b4d01b9e2e209
SHA256c24f42b29e79943a702fd62d2d8bb4a0b981003fdfa8954db3215a317c701dda
SHA512f3a84cb2fa3405d074a40a280c515f91f1849b5bd8d3d2485fdf0147724ce6e39f7a262d4807bc0494bc4293675712d0b2f8c208a34516c8a0f2f4d7bc756f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5277ce0ec4dc908d27b25ee37ddee1aec
SHA12a478618dadf85e4b93e986e64a6b265c36a7078
SHA256445a747fab2d1a67a792a099a9cd879ceb030aab41234679aadcd2c204f825c0
SHA51242a9796f3445b1944de6b8c82977469bae970a3c25c1237cc22c6b595f4f9c756c629433769adbd4c7e4903a3f23620522f79de8b532a6ab61a7dbb526711443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5083c5cce0dbcfd5106212430f27e0fae
SHA1cf2bbf9cd8e93b81e15e6d9f1e9ef7ce3a8c5d0c
SHA256681a4eac65f30abbc593ce1ab9696f8fa5839f9e518fff415023f7b58fa27247
SHA5122d42bd03e326d1c497ebd207970f65b02ca44f48f056ec955dbfa1a7fe598bca18c40e115b46612fc1ebb9399fd7db035cacf705535ec2d1116d898156385f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539e7cf9d9893a3699a2420c573f31f7b
SHA1293b0a839c2ac16251b32d4c0512cc9f1240a0ee
SHA25611b1c63834d52173895ba989f9c2d01264045fa95c11a152671c5ccabc6d9c86
SHA51284d18ea3373e071af18ee0024053ef787d037cc2d9e6c7affd7aeadf613d91651531f26457aedd1ced9741fb0ffac70f94569c8cf5ecd329c8674567c99ffc29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af228e7edf2a235cc00b164d03666006
SHA1b56ad9c8271be262da7d6101146280991b5a04c7
SHA2562c2f7f415e4e4c80d506b13dd63faaefe8371dc34d9a5cf0eb6617e6ce516f70
SHA512b80c651d4d36904bf6a9641bb0f03b12663470fcac5cae4fe7e02e0ecd79b76a0747f552336c4d44517523442e707e972592951f682e3a037042a273ed17a69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a713383fb14bd3bc2ecb6e0602ea64b
SHA1e6a3b0357ca9330ee905f302151bf49c5cd77d1b
SHA256191623648e59ee5f936a7f917fc521d1d9dad92b7379eace3ddf8f4a038fc94f
SHA51267a0cbd3f2ad9bc34a7bda57fdcc46ba6616f86dfa0ad464bc8e1196157a8ea67c230773b8b33ccaed19e5befa806ec0cda22a0477d4c6b17671e69d83baf903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5159f40a1382ae59225f313136cdb5c03
SHA1641c5a935b762b96e85ee336d8fada7a14597236
SHA2569918857b3932ca6b868a9ddc4ea389e4485292a017b212ee9477db4d70a3ecfe
SHA5122f8b700ea77c27e6ae093dbbba88d0263d1a245c9484f4dbe4044e0d2a41aad26468fc538b02fa2fef1630b5706c20804e0f2ac255934e7113cf634b9e4c66a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58444811583c817b04a57adc843581c75
SHA15edc0b049fc78e3b8f24603ef40c885e422181eb
SHA256443c691fed2d0a2b38a2e495b9bc292fabab01a89b32a45a07a655add1c281ec
SHA51295feab67866e8249c96740ac1d8c6e4ae9693cbfc8b46a06e69b9c7f4e7a52625f20cda995d9b9670a0e5f75e73e8193d66588c680e2307e6625ecf8ce4ded54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5192c20e09f7df6c759a6b14d084b4ac5
SHA15bb88a85c7c1b81bfab720474cc9c921e3f4f64e
SHA256e9eaf79d31da4c6ee53fa21a0cb159ffe677ca2708fe3afd7d59fcb1ebc8af1c
SHA512286580912408a05e39efde822a538a8ff3972a160a3673114f4e008e86318b6f78ed69f7ac6f696cc50bf524b12d9720fa8a31a8c6bc18281ca8b38454aeb12a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50087ad2bd7add152ebe487b82935a179
SHA18234e30de35da87f524f41de851710dc7a9f1698
SHA2565646d81137a269efae1f9b5fc1c279bf1c963e096e529f0c2d1d6aa4733c31fe
SHA512bf3bf03c9ea4068b990b006c76648536b3257823ab87bc4c3e507b510fda41bf27c4f0614e7010b77cc4baefa9360f4c9150703d48fe4c1970ecaad18ee70ef2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63