Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
c57bb104450f7cac503780d4d45e875d.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c57bb104450f7cac503780d4d45e875d.html
Resource
win10v2004-20240226-en
General
-
Target
c57bb104450f7cac503780d4d45e875d.html
-
Size
53KB
-
MD5
c57bb104450f7cac503780d4d45e875d
-
SHA1
1d1074c4e68e42826b860825f7cbe2b611e01be9
-
SHA256
bf527dd79f8e615b23fc4984016e719bd197e72d47a1cfd96f54ff73b8e0754e
-
SHA512
5cb309a8b545b14ddce5ab4b5ea06aa091efc7481c0db500ee272aaf266be8f72d92a596d6eef7667ca8359f634ed02274bf00a0aac2bc54bd7beaeced52a127
-
SSDEEP
768:yhy1StJiwFEzwEby9rAL8nNEdk8nkUH1H2Sa3RN:cJiwFEE2ydALyNEK8nRH1W
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B16EB51-E118-11EE-85CA-FA8378BF1C4A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416482370" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1504 iexplore.exe 1504 iexplore.exe 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE 1576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1576 1504 iexplore.exe 28 PID 1504 wrote to memory of 1576 1504 iexplore.exe 28 PID 1504 wrote to memory of 1576 1504 iexplore.exe 28 PID 1504 wrote to memory of 1576 1504 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c57bb104450f7cac503780d4d45e875d.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9add04ed515d89b48c11ec8e19815f4
SHA161ef90f9152e5a4c4f96342cf35e896348afd942
SHA256f2d1f8f0a9c976ec5c9f6d1c2acd87d9263130bb6892ce05a652ba50d4ad2f2e
SHA512c2ab60f85dd4ac8d27a96da110c191901f63770fa3bb62d283169404736a5b374095f2831c9de01c838d8efe67bb6d32f049e4b1ea0b40804f00d2db646d49ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a3bbe48e950415582992a061e63cb9
SHA13bd01578faf79b30e2029355c5a082d5f7bfa9c7
SHA2565e07f6899803d10dd2ec0c458db4e709db8ba57ec780bc76df0f9e4e52ec150b
SHA5128139c9dc01170d82524590df8ced42bff76485997b58121c74d9d6a86447e3f2d8d07b368c4a5a9265e2901a90d815832711d1b6ae4096608e21fc5ebe0e13ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572a35d1bd835ef10a791b9044b8ddf9a
SHA18cc1fa36f7881c1d6952463c5a25663ea02441d3
SHA25605cf3931b8c392bbd4a9fa0aa96fa9b1736c32100e6f721a50becc2bd3861649
SHA512f1d210f1cfb3d89e266a13c723aeee94775d3cbdedf130afbdcc3e6802e2948d1f7d19abfa88ca7754b1d99fd9590707cb8c07acc752c86e297dac0106d94da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d11f0b640f576d53a1bb446afbf6110
SHA1f05ffd715dfeea78c443e1723a65ea7cb2a11eb1
SHA256bdc46eb9a927f0b2491a31e69696f552257efaa1a5416ae1fa93f11e8e52ded6
SHA512fc7a3115c61aa76b810245af10e1858da4823dee98f1d8e3d481511b7cdc09c8b2584f33265c99af8ba43e83a79351f83172585d32c622816b0dd99974036524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ada62ea4adba3f52ae064587d0825fd
SHA1c34236a66fc3fe967748fb338fc050e7cecdb235
SHA256c7ad269bf2d2c9f44bb8b35b664db2734d78cb0b3dd03b5859c6e73f804658cc
SHA512064e99d2488cbc4a22ea10b8babca1cd4aa1c8cccb6d539fbc3b5e59606b9a7ea3ef31aeb04cda16241ba5c3153a775030d6ec1a36f237489727973f70955604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593296dca6273c831c5c73f91af7f4efa
SHA11b263273493ac5b52ae0ed334bbaa707e3528d63
SHA25699e821cc47a710ceb9c9b000145311b304fe064bd8f55a19d246db1a828efbd1
SHA5123b8b3b7b61e6e26f95893da250515e11e0a7860af24b108dce57d85c221954c19c7021746ec3e94caa926a7f7868ca4bad8456b16c57d25f9d01fecd61f92ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59266a956856ed0aaad16066e8e1df5fc
SHA183eeaaddf149e88f26428d5cd828602ac4de0b41
SHA25650dccf882203ab7410faabeb0c61de9412a56b83f8e1aa4db31eeb846558f918
SHA5126ac4a9dff0a3557396e85d21360a18902072920fe931ddfb9a5fbdd8c136296cfce163e5789201c34042649bc6bb6ded32ce36d6a3f0ca4b0a1c8c732025cbba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e191ef0ce23a666d49fbfd16f19a7e1e
SHA11c7f643bfdd10cb276707cabdaadcb86b6d63277
SHA2567b298763bf5a435af31a030b51b1fddaa974e284420d28ebdb27b9e78f165740
SHA512c93e5a30923d4709dcf89f34fd0745fb5a42124c3b5a9293f5aaab9f11bb3c1ce9e94b540910f0999e3c94ce479337e711d58e1fdeb12f9a4006967a7fd9e2ab
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63