Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
c50fc49f7bd33ecece7bdad74135bfe0.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c50fc49f7bd33ecece7bdad74135bfe0.html
Resource
win10v2004-20240226-en
General
-
Target
c50fc49f7bd33ecece7bdad74135bfe0.html
-
Size
54KB
-
MD5
c50fc49f7bd33ecece7bdad74135bfe0
-
SHA1
c60d43ea43145730ee19d2fbab6a8d7454ca66a7
-
SHA256
76bffccdaea6a2540c191acfb50c550527b677f58eb68d261f8490e5034d2aea
-
SHA512
6f267d658091152ce43eef8dbd9c7cc5c046ad9fbfc8f0c74b7d6381948f6cd39f50d959816c8ff2416aea557e93a7c2263c11021051dc4f9786f14a7ff2d664
-
SSDEEP
768:d9T0EipBkpLodRhU3s+jcWcy1pFdpIt76XDrSw7C0OtBwDz:7TupBkpLodRhGsyVhdpIp6XDOLtBwP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416468617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A030071-E0F8-11EE-92E0-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605447210575da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000bea2fe6b10a9df34687a92cf33a0f3120d4951fb07e37e55995ed7dbe3cecd29000000000e8000000002000020000000f19de124f2e19ea4b3f496137642bc59b9d77dd0a7c2304ff891edc57ad59a9520000000ae76d1b4f6ccb40b43344df4bdce4fe37233b278373614087aa128bf8984f4844000000088784b2b5bce3b605c5abf19a2bdd97b9b32fedd50fb2de067651421c24dfca9943020a600ce3c5e04c97d092a59637a7f1de0bf7a065d4f365ab1d2e8524036 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2916 2248 iexplore.exe 28 PID 2248 wrote to memory of 2916 2248 iexplore.exe 28 PID 2248 wrote to memory of 2916 2248 iexplore.exe 28 PID 2248 wrote to memory of 2916 2248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c50fc49f7bd33ecece7bdad74135bfe0.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537a56830fede1f16ef197e6309986d5e
SHA16b6f4dce49adc232ac3a435e1405c8336ed291ca
SHA25640d3376f719f3f394cd42ac22c6b2badf51754e5bbace1c5574d06bc0e1207f9
SHA512d43edc461d4bea0eeccfdab62955aaabc17b799bc529d8893659415b299cacfe1af24171a9dd0217a30c5be9f74e73ca63ac1ce4bad17bd925ca91b6e95dea9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebaccc1aa6e4a49b87fd9358739b3de4
SHA1cafa9ddec42befb9a4c8c6a26cc50ffb1a86d0f8
SHA25631778d84c7cc43b6924608db7d744a6731043f34bc2ab5dd10ef800217dca908
SHA5126c8000bba6be40dd7ffe08115bfb2183612ae7a2d550aad4121faa2fdb5338c58dd004686c5689d65638678c9144e2137dc1ba3a3ec58629d8c048dba937b53a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ddad80070687d4f6e2b6f1250e76582
SHA1bf21f49fadeb0a6fa71d3da77e06798a8e9ba240
SHA25673de48daaa9accce894978b14c6ce42161162cf7b2e9a912ef4468fad1337127
SHA51278fde23688a9f8d2c2d31278b8d549b80a3c937fe70a5bc7b26202933e5096f0004e90be1c66ddd936ef87113d141ba57eae38815db60d408c2ea17cd64b5c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4505f97ee52e6b81556c88d51369b6d
SHA10be0f3cc11e95319a51a7f72e9373da65df56a7c
SHA2563715b8c94bc049b98f8d0fa70f965128d5fecd52b196f8aae81a8e559bb12f39
SHA512fbb2313befbeddee4fd48479a4ca44f4c572fcea4c640e4077fcbb5d7bb817c82d587905a6dc0ec1d91f3fd930a97816b14a95df04229f266fec2f8a0002e50e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d082b1d78a5c3568c344f33ff6cfdca
SHA10028dbae3e6784d8c6a9667325845751c06b1059
SHA256ae4f3c1c93f46c9f3f6faeab0e4433b66d4f87899333da68750d4689c3f28052
SHA51289b880ec9f28e58bceba3e0ef9b5c5704cad003ad30cbb2d2324a36ac91b44dac5e4505a7bd9f8d8e6c43bb1b5c9a1f708ee75f5d95d9c8c1a40c39ec1fa48e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5262495744417dd86087d9860bc110ec3
SHA13b9a7a9c2fff85278b808b9091f8a6a3919a63ad
SHA25671d075d21c34b050db92c1a924c5ca9aea8f0174557f66c109c18760c543cbe5
SHA5123b5192fae16217f471223e2c73f9134d51b5a204c160712a8163c68b171d0b09d6efe1e6fe4b4436a6a0a75808062316dc283df47f5dc3387d975766929cf530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8bc4d6cf05ec33083ac000ff54f2414
SHA1f47a74f28baa714dec9d91fa68bcc1c3290dbc7f
SHA2568677f1412443a3758347938985495e5bc3be2ff3815c43622ee99f77ae8af72d
SHA5123aab70404eaf5c6db8e8e7403fe0f37e0fdc0f9bd1d5a940622f3a0a4aa69fc0e39574717125d33ab4e4e15538cd20313ee08f65167dfbb988318135b86942bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de8858c01861bf707b83b656946e3557
SHA1625788367f0543e73e555cc6239b3962e0c9c797
SHA2563e38b340f1f70a95e195166565945a584db7af51da74b44921bb2f3cad13e988
SHA512bc25a291881729486bbe4864b9cda6ef1ee6fe4c1385ba1bb480d6ee2bfb5cd2cd2e927a3c3cc09e73d09adce9c2eed15da22bd96e1d604ffe16bb66cb6c33b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc9fd54f8718957d1f5b45a4f543f2fd
SHA1737b1d736e6758e962315d7eac40505296754c8b
SHA25643e677efbbe0ae23d8cf420b7690c8d3ae28c8aedb2ac3ffcc1e5f0c89359195
SHA512e9e8d4e9edfef2eda022016400d011bf7e13685ddfa22454601cafe324b3ce9f4563c610bdd03ae155edf3172959b6f511a6b27b117044891cc65ec195811228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c66d070177fdfe49ac48011a0bcdf6f4
SHA11596d32cb7b68070795057547175d0592e85be10
SHA256582eae310b74507b5b589b7215322bdb4e583d056f85634771ddf95e1d096296
SHA512fe7e7b411f6ff310a5d767501966bc319d0fee20f2fbef1643ee0fc702ed353b697fe9327a4cff35414ff96f35092711e577060a1a31e63d01dffe227b5d4060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e588a0b491c591122741c02237e6323
SHA112c5f0a71202b6c5d9572bd838e4b362e4fdacdd
SHA256b33317578fc07284ad6c23f94b6b1bd331e5ff12b1632e86a559f3356dc153ba
SHA51249ecd5f0a6a7a0ab08d72a8c37103b12b292b9c9fbc0debd863963bbe7c851fcc832856b050a502416183392ece733cfa29a022f613509dc54329c8e456b07fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561b42804bc9f5816847cf2dff3deb3dd
SHA1309605c9fd928b499b986035631d9aba518987d2
SHA2566c3309f59b4771e5ecc04a945bb2cea0aa62ac8a9921151d7d7ffbf5da0050b2
SHA512293ba28b0b53fd3ba330a659d108dd182d37945fae241aaef4c193aa2d49ba0e501d76c5651e7ded7d33403c1e6adedbf67512081d0239fa4343207c4e5be597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555e7e70bfe673ee21aac94ab431a0f37
SHA168b8ebb83d460fb08852a4cbcf605a36c18840ac
SHA256243541abee3c6d0493e1cb5a799dbceaa5bb2650f3cb53058f90d7058c952306
SHA5128bd5f171d30326af317ca59188b55e16272578b45c8b93a04bdf5ed1b14956ac3fae67ab195c263eec477b9ef59ea966d16ff4c1f5d51a55fa3c9a0abf1f7810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edc00f7193e5acac77df8d630ec11a03
SHA1beaba7631cb36a7f612896388bb5022d368181b7
SHA256755691a3ffa29f04e8e9f24d3b02b9f3a308e78f394a202383828f624789e1c1
SHA5121621419a37ae92a11ee2c6f338f087bd7c8c115124faac8b391feeb61564bb876475f79ff85fe1f361ee1234ec77cb36d9cf09d35f20d1550987ccb69fd94f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5854b1f5b9defa088afc8a8c27d0293b0
SHA100326b220a83b4ba747200992829c7e6b58ad718
SHA25654e4f722d8fd1d442e6936faf9fe5c01a94382f850a068d015894fc18f5e6cec
SHA51293369a2d666abd66be420394f994c4754718de853884d819268a25b77a9b96fc1821c0d3f12473184498273222a14928304b247b7866decbeb1e07860b7aff04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f08061899946bd6a22d2170aa0d2620
SHA17fb72f46e6642ef8673a225efd2d0b81ca613d37
SHA256975521f566499a891e6112ca203ce9f2ff0c1c924617a6a538cd216447add4a4
SHA512dbe250d92a758e03c342622d20b3b3a57e9e64e85c42eb40ea780b009a518515223d03d9578b84d5998f7e4b2b7c6ac54a6636671a1ff6225b1ca502c36659ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562ab8406c6ea6d7aca2fc7fcf71da962
SHA1db1f8751ba5526ea391b4b9d33f44c934008fcd1
SHA25641e019f77e2f787a0f107006d2c8865890f6d50770bfb7896d6370f5b56244f3
SHA51240e8a0363b0a811a08b2cb6cb58f66b1827b7dca574c71814e522f3113940a1555adebb9148a58c422800281f382e060a3763c8ec5781f5fe91c355caef992d0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63