Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
c2270aa9a3d1148e543c92efe5f19874.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c2270aa9a3d1148e543c92efe5f19874.html
Resource
win10v2004-20240226-en
General
-
Target
c2270aa9a3d1148e543c92efe5f19874.html
-
Size
69KB
-
MD5
c2270aa9a3d1148e543c92efe5f19874
-
SHA1
3904a1640c1889296477298bf5770591cb5b36df
-
SHA256
5138d7fe5fbf339dead1f6e03e221214f1ef75acfe54c7ccd7e66977ef91c0d5
-
SHA512
f27d26ff24f67e0d05fa59728f9662f4b45155a1507fea1a9ccb5f07ec396b70ccde9e0ab44a95549076895c3002d496023038f077027177a46c1fd3b2910783
-
SSDEEP
1536:vIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7S51oG:G1ol90wc/IvQia1L
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c6000000000200000000001066000000010000200000004e579d381a113f9b226880ff3a54bcba6f8b57d226fde2a75aade73fc831922b000000000e8000000002000020000000c008211126607a2d7706fe81893e9f52d8173d8aeb50e028b32bdc27130efcd1200000006669ad507498c452c6a0c43a9bb7b88d70fb55a5ab4ad09ea6d433685bb4a5ee40000000cbbd2b1e8b5b4d91e028faa41274b505a69e1899eb68ce1351a3223d211902ba7dcc8cf93ad073af8e90e922ea99075bda9d3837af325f0c0674d10d5a4e3473 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3A93CB1-E012-11EE-8840-6600925E2846} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c1028c1f74da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416370017" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 1668 2264 iexplore.exe 28 PID 2264 wrote to memory of 1668 2264 iexplore.exe 28 PID 2264 wrote to memory of 1668 2264 iexplore.exe 28 PID 2264 wrote to memory of 1668 2264 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c2270aa9a3d1148e543c92efe5f19874.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588d1624884d0547c244797299b3c2827
SHA1f185709a29c8398c0dd2af16d30a6accbfd2ffbf
SHA256c9e533c28ffa684ad9b3f2f12f28ab7d41a4dff16686e55840d25c955c6250de
SHA512ef3fa67220ad602a046b9a727e42259a57a579d019fcb4630e4c475834e09bd362caa814763bb14efbdea9d1eb9a285ee394b6a658b799cd57b0cac2be8c0151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c85bdb94dc5297cc6183ce2ed09f8974
SHA1c8caaa5bd3963cf0154689069cbb4da1f50d47d4
SHA2562d5d74011346b3fa95e6af4da5671930ce5333b2053dc3ca43dbcbec6b0b5d07
SHA5124719f842f14d74aaa0ce70e58a944d13a53e33b55736b5cc127605b6e36ca3fd6d73520b9e22aca101813070b03d107f0eb500590a127ba204d491abffba64cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa3a49feaee95fc1397cf8f07dae804d
SHA1b8091872916583abdd5b5fd5aef2470d0a1c5872
SHA25640a6047611969eff1451241f68d6ef95d4111edb1a3027461b79e26853ccb5ff
SHA5122ad5fbfadd7fa63e103ec0a2ded725962ffac20331eb24387e28ba2c157b2baeb7ef139f62164d110519c4f137c15929ebd5aebbe39707f63d0cc4bef0aaf552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c009794bb2fb793d5eb6565307ee9531
SHA1937ea693ce608e8f0d0b1f3f789f3c1f5b354801
SHA256f935817d5a97a7e6767c21627cf8b22e17626416ce3370c41d6724510d36afcd
SHA51233fece99fae76e624ad0260b07cc50a4921bb7eb53ffa3590e0286fe426e99ab3edb26bd8481c1e758b88990ca84de3026ce4a804a524a85eaabc79baccd5bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d384f8b5cbce24fbcb6d9f11ec5056b
SHA15ebdd7d43c836dcd9c48dbd4640c18ccfc1461be
SHA256242bf0b7a2dfc96f598f3a703142addf2babb7324d1e9187a8a5d37cd2150f17
SHA51207858a5afd62c08712ee24368a91d9a6fc3c3bfb72e71c03f589dbd2bba038f83a3b998b61f19aeb87c9ad65986638bf2c628fe1f8bb151d50abe4e908ba3b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb4b0283ca71d1418346b8e47569dc55
SHA12de757a469b72752a4fafbd3c7af74ae24787f8c
SHA2565c2c00967f6160164edefba0fcbfd66bc91eaf5391668f28d9a99444dbb45b56
SHA51237d70c96c546e2808d902fd20a0d4f1cd55da106f871f2922487c8ef5805c8b7691ff55de4d07817dc139b866bcffcf7f3a5c7ccfcdad928d6891fde8d299c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5604339699a35a8900043e5043dc9f9b1
SHA113bda2036ea0c9fbe75f452a38fdebb6f4049e2e
SHA256164f8b382a113af11d46833a08863a497e8abcdb51dfd66fe0df17740b2b7359
SHA5129427e69c15825f8df040eb47126a1cb1fa09f3741a1954b1aa4b7d755273e4d267849cec591c51409186a5df896925375c9838a8442b29a2d8ecc4e0fb4f902d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fe731421c668c680d6c617f6818737b
SHA183c49264525a702cb8c666c793531b1dc3a993d6
SHA256b819148c17e9c5efd26712a5b5c3585c8642d64d0ac100bab8136afd473049cc
SHA512f1e361c126d44c25525fa181ca7a5d45d50951dcbb85a94ea2756471a1bc4a00063c5d7b5e2bfd2189645b5c3e6747521e9255795b370f9ab852651927d41701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e18b43dee03bf6c96c462de416dfef87
SHA1f3ead3e185fb249168cd7fe727262bcb978a64ec
SHA256cd0f9d881d655776d1c5e5e68181f80adeaee14e7bab102e3def9f28ca5238bb
SHA512e905e3de3b0bd93f9ab8c7aed6396fc7b58cf8a70c9b2a9ad9349df9d0128000fe0d58749ad741444d571223bf1448bff2e9f301e6078137aedbea2c5e471059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5866113971d60c704a418ffd02a259712
SHA166f6f8835a41c5ee2fc2f876d373c1a7feb493d9
SHA256afc48157018eca92e0550667492a749b96462d4fd4ce89a07721db462779df4b
SHA5122831eae1ac408f9d0cb209f7cffbf40e1cbbe8eb58396edd01e9dc3fe4884f81eb6f88f340af053d877145367fa48a7c91e05d571ce689db3490c3a33ebd99d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d525643f3d1346334e0e2d2b9740ffc
SHA11318e32b705b96487dbf6819e6a2593ccff330a2
SHA256b5d867e8b300cc80cde50c92f137f65a65f441e1eb2168db221e864e67fc8de5
SHA51250bfbf092d16171cf1d069a93874341a5141d807dbade9ac7b4852d30069d6668ed433f2d229d041ea5f376cd53b31624bd49a9336c95834490b3cbd47fdde55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543bd57338b3c392d46bbd0135f87d56b
SHA1642ed0e41f4265f16e6abe44d042dccf6221b318
SHA2565c6e744e2b4fd707b17314c0b1bfba8cc452fd8c9e04b0dde7e144f01b474f44
SHA5128468b9b93b6b79d937bf6f8428ee1ee74fd0b42035ae6c58eee8e7be40cd89d404ac13e0c8c237182872ca8286a2b5ac3c078fb33b0e8c3ab5d2b92ce4ffc24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa0e7e80f8caa4117bddcc087267e9c8
SHA182a583df8dd22cd19bf034ee0454837e7207b5b0
SHA2564899223f74c5a362dca5071df91d23d963e1cdb915999bfb109537331c658a77
SHA512eb2baa3983cbc0a0a55fb3ac0f11494728afb69084ead97dd55b019715dcf714b380ea907dfa823bfb9f4e7e4fe28cc67159562edec3f6820274f66efc0307bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b98a9d2af8ec4c67f67be1f10df5e1e6
SHA152c6826f4f0ec03bc6df141b88fbe829d22ad37b
SHA256488c908354db871e9efea35b12c40f9170b8429efa09e958951d75a4d53f2c31
SHA512e9a6528065451f99814c8ffe45ba6a1f0c9cfcdb6e4393c9fb8eea5be1054311f0f6c1d2aa1a79cac485379760b018113befe9cfb6776d32fb04d45297ddada7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bb61e78619dd8d2b26c5b0a6b782022
SHA1c2bf27fdc7dded1ff20d175db0b5c7c03c2f6e8a
SHA25627071ffd9ec9212b82205df7d6ea732a9119de8732f39eae0bcd9820b0ba7285
SHA512a3bde1593308745f330a450b03b069c2b0aedfbddea6a915cc53f2250aa40a0730cc4df6be72d683de77d9796d83de8b27975cea7508944ab155da07a10f2fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5693de27241df97c194b26c62affc3570
SHA1882f0ee56fcf22bb2ebc1787d445a1ea0aa00fca
SHA256d47adb4e6879714bde57906bb5165cc5d0a374096df3a378666bc5f4ca6882ab
SHA512097798852bdb4fb8f2e37e0fe6f76671db40196d8eaade9eecd28a6e0e4f4ef5a9f849722340b47bf6f52657a974472b268fae5e1a9da58680711f2e35c11144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cae409236e4c0134c290ad14599823aa
SHA17b219f1f2e59ebf96d7219efeee85db0d81b237c
SHA256a92e5483dce82bae47f4357eba0907de4781285386a80000510c6d7c12fb8218
SHA512a315c90a368dd2847890c36f82a74801964c76633a40906c68e88fc15fa1f952385a15f3cf51ae14aa25baba4d20efeb39b7c3b4ad7b718286e1b6bb586e0fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58335d668be0f1e5779a7e0df41cf2bfb
SHA17bb3bf655cab2910d02119ad423a1844530c0df5
SHA256364ded24ce6584835e552c5338f9bb2a9b40ee96d4c0a2e0b1ddbe716540b0dc
SHA512c170e9ef93e2c0c6774f31cedd64494da29583e6ee54a37eb65c2667459c248e197221fba9711a20babb0709a03d77c8107a1d74b99a17fc26f0e9b8ff6345c9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63