Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
c54bfea0b6d491701216ffb5332e3a6b.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c54bfea0b6d491701216ffb5332e3a6b.html
Resource
win10v2004-20240226-en
General
-
Target
c54bfea0b6d491701216ffb5332e3a6b.html
-
Size
21KB
-
MD5
c54bfea0b6d491701216ffb5332e3a6b
-
SHA1
af4e52dcf84ca62842dd037f1ded4503b20e6871
-
SHA256
7d7886d59f3c1f3ba1c7cad30eb1ba59751587ecb1b5e5a3f0ac6358cda45e31
-
SHA512
5b8a2661c1bc1a46cc34c8377afe2226ffe6deaf6fdaa2c3f8fcb312be046ad0d8d06d0bdf74f4f9329bd084d7ee5a5f87db412729f15d61c65dca21488b49fa
-
SSDEEP
384:SBZDk8L3qo1AplonM71n+3aRxyFxMjucCvlfu:iZDk8L3qRpeYn+3aRxyvMjucCc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10194c641675da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E43EEA1-E109-11EE-AD30-660F20EB2E2E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc2330000000002000000000010660000000100002000000024f4ac6d567ac37612a7a28423157fa0ac2ebb565d6910a3a14799e4cda59613000000000e80000000020000200000000a684fbe52b9690de7e398cf254ee544f6c3040d3955c6d5e4864130eb6c01a820000000bf7a5ddcb5ff7a18e1c1c164c5e84ee396cd3a953704ccaf9d0c637e468c405140000000baf8ed61acb0dd4d680c6cb3e38fbdd1bc894d355d2d0da2fc2fb6174adf0af6e2e77bbcd4399d0c757df29752cd561dc85778b2e01ae017aa785bb5aaf18bf6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416476033" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2476 2072 iexplore.exe 28 PID 2072 wrote to memory of 2476 2072 iexplore.exe 28 PID 2072 wrote to memory of 2476 2072 iexplore.exe 28 PID 2072 wrote to memory of 2476 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c54bfea0b6d491701216ffb5332e3a6b.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4125912ab1d186846d389b22de468ab
SHA12d9a9d70d0c299c88914eee2761243edb4bccb79
SHA256ffcdfb6ecc29e3a04fc0d7381f04abc7115c682a000fe016f9c6a9396bdb9caa
SHA51247563ab51bfd022d46ffc3709353ce6f91814ee8b16ebe453ee024eae5a25b51a87dfc732b6fa0a3bbb99c4cb5df4beb8f67e72a426bf64c7659da84154ba43c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f622b08fe2170a71f905b84eed56e6f
SHA1dd5edaa921205b84c311bc9aeb20b4ae41c2521c
SHA256d6395dd8c76cd20c0482d645b87dd2c3f16ea10454e802048bcbae95951ae991
SHA5127a9c3a3c3b2e0aabdde3b285b52ad21403cd9f1a1fc317ec4ecabdb4d3d7b9992256d9b243753a9b57ed4b14626654323906838e161d79ae9313cd258c550aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a0280909c0af64a5b49606ef6af3549
SHA1f3de806aaed70ee19be7dbd87e067d7577ae219e
SHA2566eddca572ce9f1df83186df404864c1f70055f797b62211937757f2a57f0f9bd
SHA512a5c16d519f521a9cf6eca63775c1b723f6d45a588b6aec25bf970f1721abd279331c7e733dbfe58e779ad189ab73f765965185762c63fe9953b60d9e20201036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ce61ba2af8bbb2f9f7df940d0316dde
SHA11c9b01bef660a2ca638f3518d8ae8a74c7388031
SHA256108745677518eee6ebbde5a8e21fb6550153f5f00b2d4ab4a790bb724997ad1f
SHA512b8fe8cd689d4d8eb2c6618f28ce9c21b5571d8bd7a2cdd5b46917b8be3ca2690e8c06f464a2adad36f959d0c9738896162a9a6f7c7f2b2cabfc38a73db558358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb0593dcce3753846a6b078fb68cd661
SHA182113a866bfad1ed00792822e601e8b6fb55a458
SHA256222b37c8ae0c12cf584f1ae060f3fb3453a1cb5a38fdd46d4726d0f50c4083be
SHA5127453341d0c3fd60c5ef3279d37a69a6f8010e59d132a8a9b2e498d102b02fdcb5af3313a33782c46e49651394e9f0ab6ae24a49f317189b3c5b91bbdc54d6c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a82f4c4973ae95d217aaedab95e5ddc5
SHA14788e7464a4af8d50c6953d8e866531d2172483e
SHA256432040ac7fc7e46e02230a6068dea142a3576a6abf18e33840cc811eb111a6b1
SHA512f615d2f997e36ac06c1649d637833c69fd1a9616e262624b524aa393755d0698d036f0b712fa9c5fcb7cdc41ac7d7e3bd3589c84e59e99ac7c153d7d3946ec94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f6c324160b2de117ea161cea9fd28d7
SHA1c7a49c5e708c0dbb6106aa0e8a5d4f077f4b4949
SHA256dd6fbb612ebc2b4e8cbe94bc3a8a8bc242a99c0cd04c271ba20134002d30251a
SHA512320bb66357ad34f059d74b0c777b79cd44a3e6104fd98ae7cc5fe7b369b1189fc77471e7de7866208566790abb16397428dba06b36331ad1d2772f12fb16b3d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecc43e79fa049574af6d9d68f2956c16
SHA1bf72c1957dacc97db7ab48f8b8ad002ec504382c
SHA25610a6e1c6fa69bd79b916ebc23a358d7aca5b10430ceaa7d1d69c4c61a247ea05
SHA512a3269559e6890fce6ad2c660681bf75914e7aa2bfb4527647768d31a77684ae2300365a1620a6a5adc888d762bf90d2ebeea4c404927b1cfc79b5eaed1a926c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c8ea3e942b2e8c279dcdd74949f6791
SHA1efcebd773cb699c1210f8f1831cff01cd17ffc74
SHA256c44aafc76d2e4de17ec2a3ae7457e9d7bf40ac2f08cce7f5075243da2be7da2c
SHA51270625efdf9543a2c1a3cfad558da572f1649adecc7d4e7c3b502503639d945a0868b4ec2982c1ab273604ef66ccd8f0d71103ad0f4d240abad3293a4cd0c22b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abf911468f5fb9d333b13a3be1fc751e
SHA1c68a1d63aaf6f5d87aca1fff353cb6c8dd0c8355
SHA256f4dc0c3504d7ae2ce5f07c800ed7aed85a4740c0f5a4684c34a4293c426e85fd
SHA5127be9fb35e6d7aec50c37138aa9ee008c9ae3e230ee5f37dbd124282d079cc5e855eb90b2b2142fb0cda4edeec0d7d2a6f3dfdf44170e6919059515c2324484c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4af96cb78844b95254927a2f2d709bc
SHA1bd010fb164c67e009622263ab1fc7d6bb953cff2
SHA25687bccb39992a430df91cd3d0151e61857a3a774d01ce5f9666e7f4345513171b
SHA51258531866c1df13bc09f9b3f22ebe7a7859216154340a12a9ff4baed6e03f795cdb281f4da01c539a95a485c0e560492b66726519c0fae2506231a267c6418753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5098868b6abf87576e489edfd35509e8c
SHA1f5f1756448a5c933bd5a64f9822be363bbaaf281
SHA256359624eee6a5780b186a37c6557f5a31f7f9bdec8c48502eaac33089f89815b0
SHA512a08e3d6c95c1258e7ea945a0652055b5a2c01c351be442738bef16d23fe9d9afacceb89aeece9336366970c2c47f618efcda63504547b6fdd306a227a94abf3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb126fe14871e0f28dc1280c46fee962
SHA1575861969e36832e27c0f0e281aa54af5a0ddd46
SHA2560d930ae534452b30bfe65ef01af4a8cf88c1599aba2d3c15f511276295218a0d
SHA5121bf96c3de66af32a9dd4c401ac88ba9dc4da1ed6cc391bb6cfe8c4a25129aad32df1cb7b0cb91d5122ab70a8571a8b963ed4e6270d979d75b2b509887ad3b2a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581de09cbef76597213243defe8bb65ac
SHA1bf4026237d57ae3da6dc30c75c271acd2dec494e
SHA256440b39d3efc77602f96360382b24f0d1ec5f674140887b0e446f9f44a0da4127
SHA51262526626c8259fc7476a3b66ad5d6a860b75bc0d94ae501b4519cd446c812f7b74e90d3c87e7eac79e3f7d88b61fd5531525e312e1d5c880e2d81db9c9cfb5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f6133da08d216133bf95b3e0b359f3a
SHA138513f15e08246b99a5c97392886d4fd59779f2d
SHA2565d2c911c86b71f21a4af02fff38c8ec640e1beb14a1e5cd2bdcadf110e02bb41
SHA512c3aff843825c384081dd65435950ec661ecb2b00f439423306e8c53cba3fb595f314ccb311adf3cc5617f2a5bd519b9266fce94118d6f558306a0a080009e47b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555c1ae746789e86767215321b571b528
SHA10f121304a84110f6a19edaf2967893b031031340
SHA25697bb3374599fee53cb7d86fcc04457e8015adff750ad1d057d502f5f2c77dfc5
SHA51258205992b2c983971d271013cae9c3c347bf8a0a75bc67fcbc226414ef1dec55bbdd363e549362732b57a79b4218775a5fed09cd480b19a90f32e4e49d448918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f44f4824071041df8963200cb2d27d7f
SHA15871f825bc2801e7c0200c1ce365ad705b73a4fb
SHA256d5314e64435882a39959562e4bba6b518ca6dfa3d0d4a9c9930808aa755e583b
SHA512e25ac9169b2a4a9868b0df6235e7883b88ec86dea349a90914739d37997c86002aab7d37fa5293063b1115bbcaff850a4034bc9576bed32809db0ecf8bdbc787
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63