Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 02:35
Static task
static1
Behavioral task
behavioral1
Sample
c4c209da5e53350db7b2fdfbf29e91e7.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4c209da5e53350db7b2fdfbf29e91e7.html
Resource
win10v2004-20240226-en
General
-
Target
c4c209da5e53350db7b2fdfbf29e91e7.html
-
Size
17KB
-
MD5
c4c209da5e53350db7b2fdfbf29e91e7
-
SHA1
1ac7c6a43b1befee7d3b5ad58b85b5fc62a6f0a0
-
SHA256
e666dc5822de623ce3a639ef37d9cc429c20e37d4679654c75980dba08a6282f
-
SHA512
361afe72ffb2d04f49752a0b730fe58e011500f7be9d06cb5dd9dfcdb4c7b64590f392c9b8e3a4354818852f9236b95fa6555c30f7758ac46c4e42c771138f85
-
SSDEEP
96:MpvaJWKn44ZxvlCPAhhFkrk29NxXMXPGnaGaOGajs:qvaUidhTkrn9NxXMaaGaOGajs
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000c0ef1a767079994c158d0e163c22f6fdc4704513a2abce2b120b96c5ddf5ed17000000000e800000000200002000000017ec010c3d6441cc32f2d7e5514066227c99b03d3e67210a58417831b4d35c622000000052e6a811cdf44fc7148f305fcde081039ff510d9d0a9ce7dcd05bfd1d9bc9b53400000007727cf44edb06cbef6e1890d4b31ff2831f515d498de3f5427951e1c1b7cc3e36a9b252592a4dd90f3eae8956c36ffd01cc98e6a0bc96d365f8bdb5f5d94d7be iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416459219" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{673465F1-E0E2-11EE-A635-D2EFD46A7D0E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7028393eef74da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2172 2304 iexplore.exe 28 PID 2304 wrote to memory of 2172 2304 iexplore.exe 28 PID 2304 wrote to memory of 2172 2304 iexplore.exe 28 PID 2304 wrote to memory of 2172 2304 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c4c209da5e53350db7b2fdfbf29e91e7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4e248102f00cf8a3c0d6d0bdb1a3e4d
SHA1d4b738dd5c81f55f3d8c63ae73a56477f6f47683
SHA2568b2c106812065dd4ab501112d5d1983c885fe02475a4146acf133f8f43761e51
SHA5127df2747d4fa79dec0f3840744200473654aeabc5e3ef3e24bb286c5c99c5200c5393ac98cb5100364ef0c465ba2fb23ce327e34c84666818256168f2475e09c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df2d988b7c792ca8edd568f2c9d554f5
SHA104b3c8c601f046890295d86f1dabdbcaded08dcf
SHA256beeee4fcaa121a115a950e3d2d5bdc7a41794e469369a01c8329b21729f4bc98
SHA51252003f884dae5d732e96b86b246ef7418baacf5db0a47863f05050ef8387cf852bae823386928e00766f7372e063f5b47e68136e823f16d87b4fd974ac7f2bf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5063c2aa3d684bf49856214a61b6ffd72
SHA1ba8b4213df86a4f41873189428713e57e89b02a1
SHA2566683bc76f5c95629a692b4edbacb61471786f3df429f1964db27b65d888bb5e5
SHA512adc1f9e291a3bda0b5dcade34d3fb6b72d58eecb1e36079be37cf5e28d70c9ea7a93b1f19b7bca7f0857ca743a1c468426bcc71fedb45cf90cdf7895f9398c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517923789e9bc53721aaa8649925c8af6
SHA1a00eb8b9e6ddcd14b313421ef0232a9bb76df49e
SHA256e88d23f2354f7da52345c59af71209827c8e721e68e6dfec20ed567edb8ba9c3
SHA5125958ebf2301a46b219808f77ddfae033b14931b20b136fd24fe648ba8ee27f4b132be99a50563c1d3f0b8b24917935f4895c879d1713eef8642716fb51cdbb02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ca34a6cda3e8c1fc92b65382479e36d
SHA17ca9fb7aecd50f915b4d369a0df984327fea9280
SHA256303440b3d157e1d366dd87fd8644dce658cafcad5b958ab6008fad5389264e2b
SHA512ac32b418125b56ad39d9180de487453fa117dd3a2d968e2111b842a5926afbb86feea14c833f3e797bc80fd40d488ed06196801387ca4d76781c7d1eacb9dabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5cce03c121e355bf85c7828cea79f15
SHA1406cdc4dd015cdc51b941057f92b6853456782ab
SHA256094d8c67c7650014ebe29f0d20f6db81c7bf5977402874c848991e74a9ba36fb
SHA512a9ef2f7bd6f721459854e29e6b3fafa4609442b96028e063c918f56e9418d12c5bea607f89ede49ad1e1a86d6de7896f87c14137e32ab45ead707f07f00e7c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb65d99931628ac1fdf0e49bf373e53b
SHA1900970d09c2dd273e8e8efc716aab5462ee86306
SHA2561d146f1cc555f69ba55b880239b54fae96287915654daa169fb81f26c3f77f53
SHA51270f4b24b2037f11a03dccd047d9e615c689472a65c7c3f105eb115577a3f4a3322aa49f3e04bbade8b5d43ec8d62e6be39f355fa4e33e714b607c76e9e841c93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eee76325ffda560141814e8804995ea7
SHA1da02ccc45c551df7b2c16ba82dcb27b7c3eda701
SHA256f5c1769dfb4f7da3d5ca4eff3ecc7e3c2de27c7bfb63fe5b48aaf6e7d228473c
SHA51253f19383366a4fa077e84b5695c6dda4c13c713e38807022158f3f604f4ed314cb16a189cf790ac583967c65d6f39da8be6a3f1ef153a5d0b8c47b3114a2af5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519e4e9d310f130c18df12f4903308b62
SHA11b21a24b7a06c4d448f7c3310638326acc622dfe
SHA2569bf3d56cd273d45586342895fe60d8bed32d0d7efd451409916e257b3ca3d334
SHA5123288acb56233defc95daa26c89e286e9ba17cf96ad0233507142875b99d4a8947ca4bfb3e4e71f6577858ce18ed484dee55a4dcd38a2d6c2c52979fc580de491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593c77262b77a1ffdcbba0d51d933c7c8
SHA151da7126a2b8ff0935b220e268631d92eebf98f1
SHA2563aee2e46eee1aca6b623d3c204910a68d441aa38c27b7226d8c4c93e2c26595d
SHA5128d286fa58414658e0d1952b478d7a450e2c84330f5fd13978a198c55fa6970ee2816cdcb6e6c02cbbc3911cd8097d952271e39f8e4d0127edeba12f1419afa4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5185a895a8d85f812bb4b06fd9210397a
SHA1a17837f46f42428fcad5c6e4e92ec7351f40c0c7
SHA25615190dd07bc143f8d081f9b9b38ed59b286323e683ab9c6d53f82fd157f4273c
SHA512f9770e9e07ecc445ece3c7929389bb0aad8f9fa2b6efc5152fe5e479d40ce4a8049dc2a6e3e640e3c36edde125f1507896d42269f8f55d007ff1583aab8cd0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a981f9c52b6368355d3f76a7619f3cf8
SHA1de1d5c0a53881c29cf64986abd92dae6a2f89caf
SHA2565f5116ea975a0229977f895b712d8e912c9194e2994fc747f20c2ac1742912a7
SHA512c10b4163ac3c4c228f8d0fafba15019e0c45b22fc3bf46141c1a009b50e335a543abbb548cbe245ac2f37da18cd274f5d55b7c0eab899295c06a0a6aaed5b38b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f711f0ea9a18d455fecaded68efa5c86
SHA194d9d82a8be8c67d5b8204d4ad3e33c44e326014
SHA256f25f82379bec81252055dd561c8f8cbc704eedbf98d8355eca6de2951a8447df
SHA512f40b9001d1f43215e1465fd065e688b2ee0cfc87457940de3d38a8ac7151f028b10c8894d79237726be645d4752ce28fb4334a8f0373a0458651dcd9eb343f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56dc53e894ed6fb893fb3ca97894dc70e
SHA18691f4f37ef02fcbc86797e4824f6f1bcbf0ee64
SHA256f4246fcbbac131258851eb5db4709c787c2eb7c777cfb60c062cdf460386bb2c
SHA51220e63779cf15e1dd73a4801d4d1997df8407b5b890e380c17f09156a4652cc26368773ec3cfd70e2940865276c4f3a4e64ffcb714adf8e67e99d3b7a1aeaceb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545e9f526f39126a874b4d0e12e1df509
SHA121a05ad5be09791901ae464834ef59e51d8d50e7
SHA25682ae373592fdaa4d711d5523389669740de67bd3a8d4227bad4a9274fb5f46cb
SHA51256fc36467e0126681250bea043148eb09b5f8595a3ed1593a5f65be7092b9d7c35404a905cc287e427aecda293c0bd32bc1459c99fcbf020244a4167e0b5f40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5569e957e76354efc12b5c3ffe63c7c6a
SHA1049f80aa0f5c07270a770331d6197ba3d57f40c4
SHA256fa5a4de23f7975609cef850cace3f1d717cb3c990bf7c429e1dfe7051da53e2b
SHA5122c21b85dee35ba60c71dffa5496fac71910d05d4b77a22f836c37088de26ee8603d3ae8d69e7f4418e3dd7521f6699d954cf56c3fb89f016fef1db24be6e62ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5907abfef287f6307c6a0ab32b9e6927a
SHA1f58654e34a7f0c119aa2ecf24cc0058d2c59198c
SHA256afbeec29a7a2a0bb325c613e283d369b816decd0d8443ea0cd6354941dde6a9a
SHA51215bfc18a00fe1254a985f0b4585e03667c41c2b251b9514fd34b000e228dfc2042909ada2c8c284a671944ced6b7fc791fbf30c0b11688bdeea90e47dff4a808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d6e7293787c67f033ffae4f20d1a6d7
SHA171b8ec0111925b33bc2fed1774becb5a4b3fbda0
SHA2569596ce423297a52c696fbfcbba08fa4d2b8f3ec176b28f0a5e2c46895c590a54
SHA512ec033c672f688d663a5fe5af806ff1ea2b78bf7d98880ceeec213ebc537b057a8bba9a21281813731a508e8c2ac1b7977712e6bdce0ba8914a15fec65d8cd600
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63