Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
c1fe580d701df6756041a4bbbc809de6.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c1fe580d701df6756041a4bbbc809de6.html
Resource
win10v2004-20240226-en
General
-
Target
c1fe580d701df6756041a4bbbc809de6.html
-
Size
979B
-
MD5
c1fe580d701df6756041a4bbbc809de6
-
SHA1
896225642af1e06672bf04272b95cdff701910b0
-
SHA256
e1baba85fe06aec9aa9e0730dc8d3a926209d039c91e62df808c514b6adcf660
-
SHA512
24811cfee573edaf2267af5aa118ad0bc0c761eb0ccbb560e8e0c0f3830bf85b5570e54123bcd2513c9eff0f6220b7e6ca389de2ab50955f779c346d1ce12f8b
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503ae44a1474da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416365186" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71957061-E007-11EE-AC06-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000001c6bca320f0123b4d362370d4d47657dbe403b4e84a5a5c216ccb51c0276478e000000000e800000000200002000000087de54750e0ceb429256fb40efcde903065dac020f9ff87a5f36f96c7ce32ecb2000000060cc52de6c1cce5cad9acb3616007d36e728956017e80fbd3151251cf361b53240000000cb3e1cb1fda058851362b6676c32b23afcc9773291aa4e1ace3de996b28a04a5945f79f42ba932ec797d7e806be7c86a90a3ad6fe180ade881a8dc54ed280235 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2800 2240 iexplore.exe 28 PID 2240 wrote to memory of 2800 2240 iexplore.exe 28 PID 2240 wrote to memory of 2800 2240 iexplore.exe 28 PID 2240 wrote to memory of 2800 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1fe580d701df6756041a4bbbc809de6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51afe75a037dd7160e22597ded7637387
SHA1dc986b72a50ba54bec12860c227f768859622707
SHA256a1ca829cfb306f3f824eeac7f8855da99c5e318a698893e9721e8b806b2e8184
SHA512313fb5e5cc08859f6af89d7860c35aca35b806e993c638b66ae86dc06e961b0ec77a6a3a054f8fdee3434ed98200080784dc1728c12806cdb554f2a10ff84bed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4e472928a72abba9c65cd6dab182596
SHA15f294b965a38f14c8278535673c8c24499b9cc69
SHA256d4f5c0465fb25bc71943789cd4f0f68eed2b8ef2f0c051b7954a80a87ebeef37
SHA512c2b9a47b6d484627d2d1a196328d124ecab223cf75a4b3041467ea8fa9567b8c45b414b79a59e72e17776aabe6eb730cfa3032420825aa871a593f73f2304631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec447752c390dbc0081b0c1619d19d37
SHA1b5e1c3b58ed3102c09e4688a568f993ceaad3ce0
SHA2560e28699d4da0bc4c035b294feb658b46c36b1e376a0cb85031050bc02c9e58a8
SHA51287195864931a3f676c4a9cf32ade7f6019ffe3d54c8a4bb980d3d78a0492308ba5ed60d0881e6f6655d61645951f1812b1a003e24215213805340ce94953fcf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53661d2747aefe4f16e9122c1f3e9f5bd
SHA1d1f217b2f455f673cc8932d54b619c0bd22358e0
SHA25601de6071a2c5999f27cb033ea7e7c615c2beb1ad742c422ace6700de0b2c4864
SHA5129cfd8322de80b336bfb622b77d34e0454771f485487a70cdb473abd68ccad1e69fc4e13e3e675513222eb66ea0be530620038d18a72ff873c032de4a6289a400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540f231ed8728aa01b347f749ccdb5a8f
SHA126c0a75c34b14794d3840fc05c4a09b90b426a23
SHA256989ab5f8646df90edf62d0901da08123f7aade1020da576227f37dd82b97929f
SHA512a786ae5808c71e1415bf9c3f42e95446f8ed6ec5834f9d8359bd85faf117e95c62e79908af21a0eb9e1d911c280550b662a642b88d8ac74775863ce75e66acd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9fe78ef17b63c8171b5566f64e5be4d
SHA1672e4e0fbc890c77ca95b0dbcd0d3c300a734ead
SHA2561fda3d46f978951b0b39aa31122902a17c503391296bed93ecc62b38f84f4080
SHA5124f9637b1a1ff00c0264c2127077dabad4d0ab0d65dd6b201f125df28e2b5550ecc2e77f419088d414ef5a39545d1586fab47a99d0d3e6bddec4e5e9f73e99d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6dd15ec1945ca13e78b44af7d28c011
SHA1cca5401a9376b2278cefc1ee3e45fc718a9c1eb6
SHA2564fb341cf977825de94540aab68e4c62af18627bf8b0c9cac90d4cccfc4a01866
SHA5123204bf2a774aec5c8f1c7d523e4cfb05c223302c16c242b041e1fe0134515a880deda5b4442de81d48728bbbfe944fb38787902e11f98734993748b3e96b3cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f81119915b6d5fe8ec0246d7e0995d2
SHA1b4be66ddeaa3fc92e13135f4823ff7b767952b60
SHA25661c604d5c3f63e0f10c5ea6ee4f9106d96f307768ffaf41a4931da87ddcc037c
SHA512f77f08ec6313daefd4edeed289123728413d88fd620e63dc3ac9e9cf9fdb7cc88a76b9eff57dc3df4fd5eb74140dcd37cc3dca4f1198d574608a61d57596d661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ace5f1eddaf861d5a4350f225afa272a
SHA1f85c96765b84cf3ec9acd6282324c7c6f9c870b6
SHA2569b1e33aa9e93d857e999902a0b04f9fd5d5927992f1ba05fed59dfbf7079ecc4
SHA512be0a231b2180a079811b81309ce8c362601637cffc7495c7bfe9b2c8cf56e7377ddb53a92ab1d10822c274f01b40b231548bc13faecbbafbc4e26fac9c18c05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558c2ac853460e64e0b5f7f09e6cde101
SHA138fd7199318f45d8c5e29e4f7f53672e9365ed64
SHA25674b57e56b80368fa5710497dc04148759ebf9c76e87d3b897616a3819eaf0c86
SHA512328957901211ee62d9c944297e2d561d5619204be59bef538203bac8c22d5dccb92c258e4847db51d93d7cfa5c6ec88ef7cd26b7e0845c8b0ebb08587a85d2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eb7024bf38fa228dbd3af7c1b746578
SHA1bfca83cd4ed8948fa54631a78152c2d68489fe71
SHA256d0d87e01307622398f4d0a90ceb783fb142557e49335514370231955613476d7
SHA51238fc64869420194d7e64d5fbe31bf0d31dda3d79b23adc3f3f515cb402dadf08ef62e165a9fd7588b86f40a4d69735716855394fa8fc80d66954ea43455a4d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529f82f7afa869cee971bc9ac937d641a
SHA1f927cf84f79b4f9dfc9c13326a9779cb4f9884f5
SHA256bad28720fa0f790a98f62d8e9a46424ec4fda6a59e5c4bc0cb3861639d33eea6
SHA512f0f63ebbb9944cf271268b293156071db810315cea8788175cf4e4a4e337e17b7e46d3b6c6ddfc6706cad849bc4e7a361019c72ca6fd3cc3532aaeb577beb80c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c91d97b4d62e033c912990fd6df54488
SHA1695f03156a4a0244d918a45e87fa5af9a5792e78
SHA25601efaa7638cadf3550f34da44d33fad7899fb546f866ad8124491ee6ba3845b0
SHA5121e1d3b28df475c3c2f4115c6da71fa7a4d80aac889cc644c3283a9c4951d0971556734e8e3310941669668edd4604a1183fab36de45ad981ecbefc3398eb8843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5783ff4188e8352862356ebde8e79bb
SHA1ae02468f98d5183acc4862987319960248217edd
SHA256bf66a40fbc8caae327cdf48d14b5450822ef5a72aed3f658bdc223325b612edf
SHA51286c2d12e8e05a38b59315125a021ff93ee4b32f9685af6d1a6c3a8e8e0510e564ae0c67956abcc6783b2839c6a118256c1a8fb976b6bd7172acf66c014b8d7de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa54699d977e645f3ad0c5d2b684bb2e
SHA1a9e8fd2ca4f10ad1b97a0a6ce4e5ae24d7b32ecb
SHA25637e7b5c35024a566d99822cb353e770a27512c0ad079208784e464abc00ad89d
SHA512bb89df677eb6b8fafa3fb1c80a630d2efe150e16c80734de6e0c8895fc09501dd5c106cf39e9b800dec2631e058996512cfbd2b3e234f5751df78431348da1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bc85293666c32c47017546929a2acea
SHA1a98334647fff67c96b0c564badf075e048bd3023
SHA256e4ba732ab83eb26c0b0ce85bb6b0fedc2510a093070d9cb4cddead3e66689885
SHA5120ab0b8110218c8f3d55f6893b13cca93fd5e20bf4ff461d4528fa707722c8e8188396fa7f812c65683f46c533936f7518117940e68e96d97bdc2e9e1559992de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f25629f7360cb05208d3a36d3dc52be
SHA169d0b6ca8d9409537c02739ec0578af335deea41
SHA25655cbefc8123fde6b95e229f31249d57620d2a433a3c8d5dac62ba8b08889eb14
SHA5123165e4582a7160d4a5f7beb5574a2ceb23f950771f0e044f9151b2a8fd4018b51a4463bd8829e5e33c04fa99c485c0c7f39d1db4e0e35d76b9a98844d82679fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5718f31cf695dd7e295310f1831ad1885
SHA1651761e2643b8ae1130fe54bb5aa7db6174b8309
SHA2568ecdd062b9bb119924975fa4254811e5c35440567339a6ae01a25ad07f41c91b
SHA512d8d5f1e125adf3dca29ba9acc763151aa2386eaebda7b9431bf8e746c11c6419ec3b1cb5a3d20047c15f58a0f171b16426cc30f0d506c73696253dda6057df79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560da92cb7636ceb07e0a4ee03bd6268a
SHA1569ff8f81c00aae342d0d883aaca1b8d2bf5ddd6
SHA256113e08dfb013f068649a88407daad8da1a697027b9ff9097e5c996f6ec349177
SHA51266a1b3c992ef2b40231691cc0d22bace5f07de914c70f80230f39d11142fa645830c043f445cd46fa95a856425b6afa1afe6deae36471f44799e46c5a4da599f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63