Analysis
-
max time kernel
122s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
c34902ccc0c182a2f9d258e387bdd899.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c34902ccc0c182a2f9d258e387bdd899.html
Resource
win10v2004-20240226-en
General
-
Target
c34902ccc0c182a2f9d258e387bdd899.html
-
Size
25KB
-
MD5
c34902ccc0c182a2f9d258e387bdd899
-
SHA1
e10e862f080e0766c54a570523f957d261091648
-
SHA256
008cc961c59df369d961d47c358c0308b5a37ed8e0685b25d78e25958ba294e1
-
SHA512
02990fb52a84847ebcfb36ec458a23538f5b3a2fef8465cde9f4f4c0d12662def12c886d38a159412d2131f776be40b2542b9bf17459a898f33395e8420c8326
-
SSDEEP
384:gdg2H8oLdGw8PinOUtxKTeBfKTpS3LZ2sXsLgWQQ/U4yhoy7jfIWrYc51IlSAuVS:qg2HlL93ltITe0kbIFNG9p6
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416406001" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f700000000020000000000106600000001000020000000d73ad8342516b351f4f7723badd117c34b0c79fa0951b50adf5fa0d2a926c933000000000e80000000020000200000008213d893e768c4e9afe7451ab873fac3803069c43bd1fbeefeabbcdb2c30517820000000ab1825439efefb75faf5804c4590bad46b75b5443c1402d411579a31c083b5d540000000f7397e2522490cab96ace545dfa4db7994d03ed24479349d1a165589a4ff508cd49d81d92604e87a9372d0df2266693b109a3f889e8f497d2803d78c2a4a5e8f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F13EB91-E066-11EE-BBB0-CEEE273A2359} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0cac8537374da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2592 2560 iexplore.exe 28 PID 2560 wrote to memory of 2592 2560 iexplore.exe 28 PID 2560 wrote to memory of 2592 2560 iexplore.exe 28 PID 2560 wrote to memory of 2592 2560 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c34902ccc0c182a2f9d258e387bdd899.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50aacb9348c711c85451feae91264177a
SHA10fdd26da8ab5e9a1b5bcaee9a34393177e5f64a9
SHA256f76fa4640a17b5e2c0390e7e1f9bc3b0b1192ae7095034c10815d59c1f39ebd6
SHA51215d1bcd4242cacc585e2e0380a15372c804e575713b20e91dd8ca0e22a891b47aa6b498045e60ec489fcea02bf7ad2ff0cf5cf1a8b1eae53446d1bf202fe9a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a9ba1ea7ea5b5cd10490b6bc01a1823
SHA1b299269f3589b52377c77c68114e762dc5369c91
SHA256aac6358aa6a0e3b7ec71bd2ff6feb329373aa61e14aab9eed1f245d6e13184f9
SHA512ab0832fa79fe3ead399916be89fdd70e8311463ac4b85f459a48818fcec1f301a5a2f194b003dc6450c83e827deb6da4fa1084f043d85fdc3f290848ac437bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d5e2bdc34f8416f7b5609d65c8788d0
SHA11ccfff436e24732b46bf8708d122ac6896332b54
SHA256a7e4b87614b3604f7b0aa9de5904adaad47883373542d5a2150502cfcd4f289d
SHA5124bb7c6072c3b5febf65d35f135f584b2bf0fcef9965a385d2e673833668679db1de610de250135fce0ad2f9bca2280e18c09b213a32ff6d280fec0ecd539ac64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d6c3197f57f2920e2e6edd5ae7538d8
SHA170169dc8137836f40afdb1ace4a421ad8a061ee2
SHA25646f2b939b3b740cc3f7b5c4f4c5ffc77e53aeda1cf0ff291743c42ff3c1d2669
SHA512fc3b7043da16d210a82978c4f33f88f5f36f37e2dcebc81c01fca5c7416ccdc9cec19ef7604d2a424bfa2dca24dd88646c3c663e37a5b9fe5560c608f69d54d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3e540796e29f48a7777c201ccb42cb9
SHA12ed03ef002ca16935dfd6e7a3d3a1c59aec49ec8
SHA2564d2edd0648a61f69ea09b022f8b00ce0f0a7c4fc948f1a68ae6f214ebf6df2d3
SHA512aced39f3bb07dc4070489d17efc6550b5d3e0fb538f88cafbda7ac2d81f574b2bf0f886a313ff0b427fb67da369c18e92eeb80ab75a04808d982ee46321e4ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521f2b2c8e6559a0a2e4ec1b15489e83c
SHA1c6ed8370bdb1c92380b0958c5c2da17648642fdf
SHA25603ebc9596549387f30068effa0da2a51796b5f625c581cf43c3cb4e4b31252c2
SHA512613e5f73afdf08daf0f6b23497ecf5df60864c259e116485ab52e9877c35d78cfaaf33be7a011fa08eb337d570d6f5182172fdd1afe1fa7853fe165834175b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b428787e526087b8294c44fc73e9bd91
SHA132285a787e90d1ed34a84fd95578115cff482d8e
SHA256dd9c9fc84faa224010680ab66830fb3adffda5428eb4f6eaa8ee00828e629df7
SHA5126279d8c96f6a266e9a112647c2f2422a9a6872e8978b4b42e081d4f7cedffc9b54b6fa7453bf24ca6d0106f371b7caacc075ba8c48126da2d906d1ef7857e8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0f47954937c00c74e48436cab3d7541
SHA120f433649c66b441d864a5ff5a4c8d2c1b0e1630
SHA2560ca392b0d452367be48a99ddf6e17555df9aab8d265b3f24ca5f9311fae68c98
SHA512d28669479abbce22d2054bfed19b6ed570928730a6e94eaa4fdab8c481d84a28a7a34efbd028f55bc2778f0afd48188baab076dd01e233e1130d4055e7c04477
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63