Analysis
-
max time kernel
121s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
c97d72b10d65bd74b992c78630fe9cb4.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c97d72b10d65bd74b992c78630fe9cb4.html
Resource
win10v2004-20240226-en
General
-
Target
c97d72b10d65bd74b992c78630fe9cb4.html
-
Size
22KB
-
MD5
c97d72b10d65bd74b992c78630fe9cb4
-
SHA1
f05073b81b29f968c5e467879655699f8d20e5ef
-
SHA256
c5776f11927065c3d554f4f508cae8e7aef0f08f9c61a7c7bced98b9151e6c1b
-
SHA512
718717d936f2d968086d5cd4e13d26607c28d7cac832b99780afaab0292337ef8ef84bf64403338fd3b12bb69d08c3c63c84ce33119571fde93b270b9931b96a
-
SSDEEP
384:811bnSQbacwglgDN1OKR9OIhDi42MTpbp/sSk:8PbnhGcJgh3R9OIhDirMTpbp/sSk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{453575F1-E23D-11EE-80D9-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000072f9be8c7f3ff9c2c33500100f5952954dd9b33cff9e1b7acde8cb06edc9197000000000e80000000020000200000008c5f11d6f398a637e793c3c54e4cbc05d041da58a27d7c1a88460ed0ab8d134520000000a07dec38484c48c262dc33f06b1fecb622b72576475fc6bb6d2c1f5d3db162aa40000000a926ac99fc608c74ee162fb3cd16fcd27e36ade2d428b76bec3138c149cc9c6345e53d0acd103dee9bf6a6f9b140059b7306c7b21c63836f50f109efe16f12b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 308eee1a4a76da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416608198" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1612 iexplore.exe 1612 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2716 1612 iexplore.exe 28 PID 1612 wrote to memory of 2716 1612 iexplore.exe 28 PID 1612 wrote to memory of 2716 1612 iexplore.exe 28 PID 1612 wrote to memory of 2716 1612 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c97d72b10d65bd74b992c78630fe9cb4.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556c2fe1374a4fd5d8602101c4c23e5e1
SHA10f8088155589d79d0946251bc75c4a43ec958603
SHA256a79746460bb8a2e91331d095edcaed3ad48ab6b2105788ed82d12ae9df5954f7
SHA512a588a147098cff0e17789953ca63632f4d7c148993d284621833991bf5e6de7d12d06216afd931a9e0e9c624c5c893fae8b70269edbfcc91e1ce9d5f2995554f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508f93cebc6b29d35aa933b6af9c2288d
SHA19f58b51c0174054a7c23eb755188f08087a96576
SHA256f531a091fcd7e37b454b8807f2c726f96f4827ee93d3233df5178fa3b94cd7d8
SHA5123b9de817cbf29824601247062fe11c8a1e9e6c450d58b1bf3720e8f34bcab38d86b1f24c7c5cf11e34003a85b71f90a1c52ea7922f1771cbcc6c7fdca70460d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5662a545a627c4c03cd95a4a340feb17b
SHA15ac3d0b8d6cbef8f8c8c580acbc836b61ecfa6bb
SHA2562590f690b296be166fdfcb65e61caf0d185a2843dc384b9bbb323461f9665630
SHA512c5d6031018f6ac3b1d62699c360bb115c73f179ccc08bc45842ba75815c6c9ee91239d8eb4f0649ea72cb4945a1e3d474de77f74c2bcfc80e052a74d5ee3c484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55eddf26e4605e175ea70a81c9e489193
SHA152ea3635530dbcc6ec7fef559c64c8cb92393916
SHA25697fd52f6c0e6f8bde333ab5a0c73e7d89eb5dd0a004cd46c7e998a69f938f3f5
SHA512df7864ceb079e4862bb74043433b01f44e173cad76762f18441277c061f4dcea78ac01a93001060ffb17e9954de2d07e7c0a668cebcd7f6bb76f1924c2becd91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5443cf6b2f822b5c02877d183f14e7ce1
SHA187ddb9900d5eb1a7e00585c74c35ecd83402b097
SHA256096c846946ecf4a9b5cb4b135a9d58cc786f4ac372d7055202403bd41053cab6
SHA512a2a4e23e95da12953b56188a297dd7260eb40f84224a5971695b6e7ae85971e6cfde64724ff509f432d38c9492b414bbf40d6611d578bedb323a8d2129db742d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9626dc35ed623ee37b6c20904347ab5
SHA1122deba1f50f54c9829407198b061fe9d79a4fb1
SHA2569d35934c2061f3ca2b25426f35a657db3db729eb093ceca8759f10cf5a609200
SHA5129762be0e32ff96d3e9b3caa0dab9b787681fec10e821ed7ef46a6f22d383b9373a5cbd8a48983cbc267f00110a6ba4a7c48d9a3453deaa967c7dea45ebec2ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6bd1212c336a59ca1baba647c122c72
SHA197b5fc8499f5d8792371d7d91e1741c52df42606
SHA256dcee343734bf2f3e0089c47953558007a4e08a384aed2653bd870e78fff4bd6d
SHA512eb6995b8529d09af4b0f329e79ad41b6166e7d4960aa202595652ed947a58075b45371610bf345da02d95bb4a6780f6dd4bccc639ace3982d977d4431fb27c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575428de429d96587306a9eab2ac3d380
SHA1fcfc225d4b32dc3b32c6fcddb91d3d45a2753250
SHA256030f04561831b5de4c7fba581b8a17d2c19361d574cfb5c004974cecee44822e
SHA5126e1e11f01011b7ac8c2573fb4688e224781e43bd2ed360da4c1c91fa29fdc3fde380afd2dbc0dd3fe711cf8fd31adf05ed9b5290fc635984ca019052affef5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522cf3b225d5478f1f44b94f53a8497e8
SHA18ac8794b124aeceb9626f47e994d5c9bd9103155
SHA256319d3c4f5cb971da79cf988272525b11e8b0e3d652fe8bbf676eb11dde231c0b
SHA512f27d4dbe4e93dbc59b0b0db74a3909dbc90a54b5f13ef40a1e4cd5c015ab7e7e6477fc7f1ad8af5d34aba8406d7b76d87676dc113f1943e1960cf2e7e3fd7fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5eb76b395285b6bb5b2688fc4f7da15
SHA1b607ecc62f07057640dc4236f4d5255dedf5821b
SHA2564b07bd46d171804c750b6e33847d0241fdb1c16be37032dadee4409c712d04e0
SHA51266c5940f66c85547fdbda3ec4d6e58e148f6c1b67dda8582142ad057041d6c00351099be42e8598d1c3284e25f4437272cb311672c5857c59a52f9ece7760fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583aba99416471849a247fd579440db95
SHA183572a1366fc84783509cdab509e2c0791851f53
SHA2561329b5244188ff2446f01015c76124e8879c36a58e0f231dc4bcfc327e8b2d26
SHA512a97561a473a78823804290f9ea6efa28b67764d78c56c535f7f1fb2f52f36f26deffc59c32234732f9924beae04f26be2b6eeb6b2373f6eb7dacf5b825ca5559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570f1af1505bd339b3830c4231ab9bf79
SHA1b8b21f2804248112c7ac91df31ddc3e76e245c59
SHA25603cedd544fd8fa501835a7f6906f361d0913d2f3c11a72ab386c34a631cde681
SHA512a566e9a915ef44e70aeaf0cbc05b5e2a3f95acdd30a419b89900c45abd132a2b98018914d9ccd989bbece29353e852a60354b997681814c2c9c8f7ee9be91137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6dbc947941dc11ee2105e5013b3b0b8
SHA190e9cbcedc3187ae61cbe2397118d6df5b11356a
SHA256d7ddbad9ef1a2fe5872eec90ee114099b811493908bc21c83324cc8e82e27e76
SHA5120b8585ea0077d4ea224643fd7f3095f87562bbb1c722541d02d6efb74ed0d2eefa12644e463efb3b4404d0062e5f72fe52ba46eb51414c74fd64e619a4260868
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5211d5d141c624fddf556569847e1625c
SHA17c925a9def3c0bb679471c2ca5ba3abf8c8895df
SHA2568e7523a1fcc2ef8cde872d302e908b2a11655f3b64bf11cee544eb6255db9ad4
SHA512685b8204e13f8640e63c42a2631d144504ada4f90ee1f2421c127bc8b09e839ca43934cafd85e41817c7f684e99275aa1da38773e5bb47e120900815eb122fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5687d7e9138c9b27a6b7e5bf1900916ea
SHA11c909d2bc924357d6c89f712662be859d3ddeedf
SHA2564dd0524eb93cd7e812e86a1675ff4c30ba8615bf5bfa5dcfdfb87cdc347b6125
SHA512415625db5b2d5650d9de9ef456a9379c445725761c35fd79e50266cbf24d18808bd816e813e9873f8cb8650b6940e88d0abb3304473d8887e3826a940a1cc206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d6d78d10902c708efd0530af0830df9
SHA15828c8a426bb93735904895a0ee171057d6e0cc6
SHA25687d8021a2fbe9bc42332d3eacf97cb423fadd9e255e45d44423d1682602e674f
SHA512a65c5315cfb2272e3950268006dd5c524ff55138e0a2fd28703a9d67799d65021447f7ed3901686ba4bf88422e2fd660fb6221bc69b060d85b8be31881c95cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589304d4d620e3b616cd5da506d5c3f8b
SHA15918154090bbbd85d20e66f287b9e31cf9a69f38
SHA2566b415f86bbb279d2f65fddd3f0baff23c7443f0a8dfba1fffbc42c5fbd3fb325
SHA512094b770cc8cb266c77f5ba94e95c34f233d46d7ea31851bd0f504a44aeb100e898084cdf9d4dc97a339ba3eb2133a5b5888c59189ba7dfe03db3cad6f7c67f07
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CTT6L9LH\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63