Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
e680af5aeff3790e13bcb0ccd366236ede503619cb13c8e7348107e6906a9f4a.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e680af5aeff3790e13bcb0ccd366236ede503619cb13c8e7348107e6906a9f4a.html
Resource
win10v2004-20240226-en
General
-
Target
e680af5aeff3790e13bcb0ccd366236ede503619cb13c8e7348107e6906a9f4a.html
-
Size
708KB
-
MD5
eff9ea9d90c62b834407536ec0e0ea10
-
SHA1
f2ec90f57945eaef5ce611859a8a4a4dbb22cacb
-
SHA256
e680af5aeff3790e13bcb0ccd366236ede503619cb13c8e7348107e6906a9f4a
-
SHA512
c308af11e09ec5995fb26547582026fb088b81af7517c006aab51bb53db4ea3390ce8272363468f71c3768c85569a3026eebb3763728beb95722d95bdea65e6e
-
SSDEEP
12288:vKFmW7+1wWZurp4TaaK0eF0eVmkAbOvcwmD4OmcQLMX1r6WKfPf4kzym/ae:iAhd0rp4Taq6bVmNGIV52Pqm/ae
Malware Config
Signatures
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 90fc4e0ff174da01 iexplore.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B759B21-E0E4-11EE-A692-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416460032" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000295e35b0b1c80a4dcd39484671e6401594725be825e59f4b4c3a56845fa44a74000000000e8000000002000020000000f2967a5fcfbdcc828a98e7ec9e5158176fd812432da56f8a09718e2b69e01ab520000000e86c54167bd8170d9489a53417803dbcad4234a952ba6d4ff8fffc5536283834400000009bf87fa91d0d7357420cecbef8858ff0c89569d83ef4103d5fc20cadd8ab3af7e79fed14befcda029950302904fb4f9d6cfc495f8604ca8121bddc0ea967bd3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60671121f174da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2124 3036 iexplore.exe 28 PID 3036 wrote to memory of 2124 3036 iexplore.exe 28 PID 3036 wrote to memory of 2124 3036 iexplore.exe 28 PID 3036 wrote to memory of 2124 3036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e680af5aeff3790e13bcb0ccd366236ede503619cb13c8e7348107e6906a9f4a.html1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3980e275a3ff001bc4d6ffd0e6b6285
SHA11d47b2b1f091325731e4613bb2067c95f0ca2b7a
SHA256c4917bc202102e967853e630e055f5197ed2e6eb47e3f620b41eaa589434fb85
SHA512058121ca5634570416a09a87be032e07f1a8c471353472f6afe46d09b69d4847de531fb140f3e50703a802ea9c66403c90f9b91419ff78553b2cc58c8d082b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c688d2f3c8eb3800935fe836ade9779a
SHA10b6bdefc9558d82863edb021b9136bd3b38a14ae
SHA25613ea78f5e27fbcd5586df55ef138d65a18f4b3d9f379581c7756cbe81f220100
SHA512fa607a30cd15248d87ca4547913fb91915e31f6517ca50bdca81307a55c3b09171d8144c0a53acce3a4e2bb4083e5b67c42af3aff9ed8609a8af90f2bb881b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583591c0eb52159e7983c24e781165377
SHA1aeecc22d4a40cb2925b9ecf6c62f164786c1b4f4
SHA25669d7897c528b0558c2c832bf699a224bf84761733e78a835ece75d7615986e49
SHA512414c059c565d72caa39e3705ce2d6dd28d0198b4daa1c897931b4a7ea871bc2a2265eb7c47213a468e97cd66c441a0a040ba59d9ddf9bce58b3bc3124798e203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1af50ec75bae37a8139bf084969601b
SHA1abb908ee42274462312b49e0987ac7b69608ac84
SHA256085ea3fe49481a4d84052b7a1dcc3ab65d95f393247603b76091bd0a2c83fc7f
SHA5126ce49225237488e3afcd9dfc42996125e901e39ba7518a7aab5f759138273f54f909ba45baab1ab686a0089658e12798c66bf3a0ee1b2b6803878b30f89aa2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58cd44ca0d2254c738f017522eeda2671
SHA15657a16cb7ee7185c9e92375266f01c9b13645ac
SHA256ce7a60154c008290a4e5fb26e8b1c2c9e5d885ae03fd80267f8236629efa7368
SHA5128f9726087bec7c9f4d7d5565f1d54fe93f7aa2b3a22877c5a289ff3a1195c98e60b1afd2e283b6973c802c2b47177d006310da150779db6e02d7b6de3f091da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54530b4f1352df13b536fa39549a525a9
SHA1734b9fb4024690e3a24532b13a04cf834ba33a72
SHA2569d6f67ae96f82dfde97ce7e3a839b905c091f18df21c5e85088ec113342322a1
SHA5120dc6ed950303d56a59237d647aca556640a6c98f8d5231f274446f3e883e06596a342b2e964d590cc7040cf2ddb0da2caa6e4d41002510804943627321e3b580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dadcb09a4997863e4afc1fdeb2a663c
SHA1b1c1ed7c50a2213275403a665810ffb173edb973
SHA256dd930ef62ee08f0e00b0318877383a2a5c6f9d7816ea417974d59e2da3abd67f
SHA5123934c433967a2c419d7db90ca10401e069e782ba02d4600b3f221ab6019613cb61323708c313e0b4c968105c19615ea79149a3df26f19641a548b323c4d3bbc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5326e79b7c6e0bb942cddb16513471e44
SHA10b366204737426ec86710ac0477b865f8606180f
SHA2564c7d2077f11eae07d391cfbfb60f5014fd0e1349bf95327369cb6b04d7e1aa7f
SHA512323ccb43f7c5d5ebdd0f9f442a7bf28b1c50e2cfe2a25415423856e0f37222416f95d27e4d29ef27ba2d9833d7de3707c31fc6dbecea7beee3ce5926ae8d0d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5368c012df07690fefd6ed44db1aed458
SHA102546273b911a78cbe70a23fa4480b55aa460594
SHA2566323e1aaaf9e720b54170187b32eaf3e2b900bb7b092573dff56097281545d52
SHA5120045845fd9b32f790613dc4bd3bf7d04522ab04d976bcface1c0c81c4275eb8a07a97c65fd59952474922a3924479bfe6913d540768ba6ff597fe9c052a1bfb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56213a544043cfabe3f7a58dbf46731c7
SHA1901f291b6180696a1c3a5ba8426ebd603de8582b
SHA25657433c5780b6cd0a90531b489d9deed0d2548f545359fd922e9d7eb6a67abecf
SHA5124d1412e1aeb3046ffe658704066c5f3d215dba81900fbb6df8148f7985b62aa44c4749d71cc36427051c6976391f85dbafe195dd1f98f9a8bf4eba39b00501fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576d00799b24dd76dae4f1644a0ce6eb2
SHA19f8179a884b4d0e6f6f513091f856a533f9d433b
SHA256872336edc6f950beebdb9c47dd083c6428848ee296b8a8d2ed272ad8c2ed08b0
SHA512d1e37b1931ac9c2d9650e51f1c55dae1c9950d0c5fc9039fa2bd07c2107173b3f3bf50b6983931c05814d07f253b4d340d4726ef4421984bc78d4a9ab95f6d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b7b910e467ffb99f93b421c912998c9
SHA122d98d54da4d23999deefdb6fb4195d5c236b4a3
SHA25651978396fe064120fa78241d772836cb537455290e978001237c205af462bde9
SHA5128c5f4ae23cea70de58a408913cea5a1ae0d487f7615aedce6c935d5207898b7e706e58f01eb3adcd9cec10bf67cc0caab904299484c36396594673e92800d68a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab9f21c3b8d14b2dbc2d555c5b51a698
SHA107712218ace18e59dd59d5470eaf13e539de8aca
SHA25600f83aed27d09206b595073202c1d8955f3ba0d0d7170a08637e709dd2e060b7
SHA5129cbe669959e20dcd5edad9b9c18f8c72607fbe0ad5c9e7ea0d6355dbf7380d1787b5250b4908a307cdf4fb982b24e53181c5f8273035528752dfd170bc9f22a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507eb3e593053f687e2b7b0a7b1aaa6ce
SHA15974a81b56ae9d7fb4c607c87c99a2f356f14fab
SHA2565634ae0133683d4cdd12319cf1093c96365e983ba60cf467becf25b3615a1502
SHA512d4a66a16bba4b3e4b11fb029cc338536da0374acf1cf754558bdffa2130e13317bed3839138543884557f3f035623df0880a0f173407a007116b25433df475b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59114b4b78a90faa27f42459aaec33b50
SHA1d58114028210a602296dae178fc7ed52e8ccb6b7
SHA2569f4174f9d29f607bfd1a1a1b10957966c4debc9f26b8799cf28e0dd3933a2320
SHA512ad351ee850207cdfd981f192358a982684afd0b4ba49be9841568fa8be78f708581aacf3f8b0a8f0466ace9c808b6c758260c345b59e61038df0f12c9f6bc879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586a227feaf98f0acc8c6830faf7feff4
SHA153f4b2684a6a7025dd98cb8af5c0da98d0a1c897
SHA256e321a179976146a2e26f5a1c6f7e5b09bb7aa31eec28509ffc1694bdc6d0476d
SHA51276a277456c1acf1003227bb37929630ffba806ec9e9804c17e4e0f30e8bda377b7e40c4deffd6924f0a78a533479961673c3949e050f1fda760f7e4ee99df854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6673769a2a81e8f7db9f55743bbace6
SHA1876efcb67e214f9b23a3854da9a985463cd83c74
SHA2560e773b8271aff44bd7e34968a2909e2717a426b5689e27e41577d5dfa840ceb5
SHA5121fce3e222dd310b043990850b1b665a06c38631a503fed26e2d688b4da17ca175fac15d3b379563f17ba1a90ffd199f01e9ca848d10129effae04254c953ba38
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63