Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 07:54
Static task
static1
Behavioral task
behavioral1
Sample
c2d8ebd163e990b993c1009260962dc4.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2d8ebd163e990b993c1009260962dc4.html
Resource
win10v2004-20231215-en
General
-
Target
c2d8ebd163e990b993c1009260962dc4.html
-
Size
53KB
-
MD5
c2d8ebd163e990b993c1009260962dc4
-
SHA1
1f501fe910b198fa7a4c06a4714f01a3f6cd5f4a
-
SHA256
e2663c690d0692828f87183967430779f626b276b7cc2c14488bfb25af187b71
-
SHA512
614ea70f6996399d1b4f80d6c61c7950faa50c0410d7947fb8b08439b63e99bf6548964fe6e36bc0b62eeac00a35739b4212eaa0f90b41c82a904646bb469b7a
-
SSDEEP
1536:CkgUiIakTqGivi+PyU9runlYb63Nj+q5VyvR0w2AzTICbbJo4/t9M/dNwIUTDmDg:CkgUiIakTqGivi+PyU9runlYb63Nj+qA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309211b15274da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C71BA8E1-E045-11EE-9F07-6E6327E9C5D7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416391947" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a960690000000002000000000010660000000100002000000090aa601e8f332be5d71c0443f00f8c37d513ccb3969b8ad7213a4fd748523e89000000000e80000000020000200000009fd30a8d67372e54db323820ca7ef74dea4c4f1e996df2332289ddfc0b3dcc9d200000006d0163f920bffb9127e0a9d78a16b7c810becccb0c3372c94d3347751c5c2cdb40000000dd2f783cd73f3a13f912de51c0a8f8c45aa37e8be1cbfc9f481a9ecb423bbca72e747407a73f5e559ab4abbcd3cb32cc4f2bcb4f4f309748b4ca03116965bf00 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2012 iexplore.exe 2012 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 3032 2012 iexplore.exe 28 PID 2012 wrote to memory of 3032 2012 iexplore.exe 28 PID 2012 wrote to memory of 3032 2012 iexplore.exe 28 PID 2012 wrote to memory of 3032 2012 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c2d8ebd163e990b993c1009260962dc4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b83ee5154be53fb99a791edbe1a78d29
SHA16c1904e52e70033f96900059167a069efac521ba
SHA2569a830d2a2446c70031350b243fb24f506faa668aac29a08a433dcf8410ddfd37
SHA512d995560062470b1d282cd4b655889713182a848c4772e803cbc0e96e86cdc433c1e0529570424f0244f94a718ca43a6dee2f2f981b37bb7d0e7af848b0c39195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f53d076e144e58a15e81981561374112
SHA12f8076f132a1afd23a5eb24f83407770112ce2e0
SHA256d153532c5dd519449a06e8198b5d01ae4a43e617e5e37ef35de4d84d166105bf
SHA5121464601b1d3a03550a25b7ef0428e9cfda37e27e9f7e5e8d436fd35cf33b3c10f22b0464a03a997855829d22f28928d7fe815cc554a8da3a63f9e0135c05d037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5309fd6ca30917c918cd8055babd54dab
SHA109b376bf0d17be0c516efd12bc0966b66586a929
SHA256c9e34e78c96ca25368cd9fb94d789ca43ea67e5ce8cc9bb7bdc3af99e08e4614
SHA512889fdeb89ed944c68fb210a7994c52ae4f8bd4d9fa3519cf77c29715059bf524eaa089a4aa1569638a3be01e9f0eefbc757129e2360bd5d3fa5ba0f846fa2a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5961e386f3ce66d784a38919ab077978c
SHA1e60bc9cf3595a3fcbd374378bee7d0cbff6b9671
SHA256cc40e5f5fc466086e0d69646115f52c7e019e17f01a51aef94a39f8d1a05aa21
SHA5126625381515302caa70c0be7e9a2fc4d9d31218f7f56e3cdd0b95e1bf92cd955c45cb2b3d94f08989bd30afd09d2b20dce310fcf22e9521af28d14576ecc51841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b8a2a2d43522634afe7a70a554dc0f5
SHA15bd98dfd13ed4d28e77dcd2a37e948f56bfe9a0c
SHA2565bb5c34da57391c5a8a950e74496d235d731ff4787e65b4d0713827a1e50ec84
SHA51229309879101dda9f4d53b8efc1ffc237b597e2b48f5b3a3e9caf3e817c50a3816bda993cf3b31c3f38adc32a01064b56e4b592d4085c691af62d145cdc682015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5506098a1c80cf921c1abcede3f423ed0
SHA1d945b3a9b319071de6932217945a5b76ab285af0
SHA25663d74d515ac59e8465ad9ddc92e5f0ba3511c0f54008b943acda4fcdfb21c260
SHA512d48456401a909e37b8ac6f5c2ea41f86c3f002946bad466f05a68a563347ee1508fed8c76a6eb0ef3f828e0f3b43403b5c8627f3877b1c7fbcc6d5cda35072cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c88dfd9512e15eebf6b8217af6bd463
SHA14ab8af7c1dcbd4049c80daaaf4d52cf9dbe4065f
SHA25668da3dfc4fc6f6a671631625a18c71d3315ea50340071d761d9202f73a90b54f
SHA5125fa9da088a843b00ecf3b2e2c41e8103df7a8d411c980c9428b2087739d452b13467cdb5ac80d749ef4cc6add88b47106782aa624766496b74411aa73a8ebce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fff32170ec3b7ce798dc33186e7a54bc
SHA1c760756d629783d531a4b0cca3c61fcd1269e9fc
SHA25654df37159619efab8a49217cea31c740957af19a4fc3e936f199b0712a3197ff
SHA512a04780b6fd3d7558343f2a2bfb6508581413ea13570e1c28d7d91950f17a8d54e1d5c78ff8baee782aab0bf8222808ae6448b17079f5daa78745b646f6c54e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a84959e899e49a23639ce4996140215
SHA16d8f7cd41dbe09b38fa65cb0bc5b4c37cebfd66f
SHA25693e0e245dc5ae594ebe2be988a690a461558b75a291ab6eb34e50bbc5153d47a
SHA5126a58c52adb36a9f2a606ee1117f3a75bd8bcea469c670f48cae957585a07272fb3c1b701d3dd4fe1e23915ab9d9de6e636fe5cdb06e4dd6b94f3acdfdf5cb585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591b0c08d1896dde33f7e0c264b5b9182
SHA13e6bf2473b0fad3b7e55131fbe3783fd0bbb1f32
SHA256d6e01c62f3e3c529a8a71b6ffe27b35ff64a448884504e615c8e3ba34d98111b
SHA5127ba2dec5e719cda21545e748372b0eafe5fee3b67d9409f91090e3d1bd0060531ed54ccf3004fca0a43a09759f3bf20a359a9738d22f0f6beb9910c5aaee92b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505ce16399536ea5731b403834089c450
SHA19c328f5af439e2c16272c7ae5bdd336a71c9c108
SHA25693de2bf4c24bed542dffa94e4bb53194032f00bbb46fe0bbad67a02e23fd8f6e
SHA512224e3c3451edf281c4c805e32136ecdc0b38ce05efcd4bf4534b230d26b30193068ad5c1629298eb1e7c6ac5bc73dafafc0a02fec666c6cccaab6443821361f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa2ddbc877d9fa2af4a690942c7b4e58
SHA168a3a96899c19955fae566c693b8921155d88862
SHA25637643e2fb9e3c2c9d17c760a0233cc268d4d666669f40b4f062a7134f74e7aab
SHA512c200da9453292743db2ab801506e457296471146a3cc2def928dab555fb3f5ea54b9f89d62a6b06b931194e1cf18a3cb4674589c6355d27771fd739744be00d8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B1014REI\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63