Analysis
-
max time kernel
143s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 22:38
Behavioral task
behavioral1
Sample
cc6f5ce9c634e4314eb397f8dd1b144c.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc6f5ce9c634e4314eb397f8dd1b144c.html
Resource
win10v2004-20240226-en
General
-
Target
cc6f5ce9c634e4314eb397f8dd1b144c.html
-
Size
5KB
-
MD5
cc6f5ce9c634e4314eb397f8dd1b144c
-
SHA1
45a701855bcb6166ec6b90fc3f37d0c2c2c08957
-
SHA256
5773a66e38797528755069e92c8d7c0f02adab00cf75a9a8d6a82e0f11a534f8
-
SHA512
a4534d3d7f50481a29ae3aa298573ee0465328b2a867b82978f1b4803de58425828d0e2ed8c6de6b491e65844fcc8591c8ee3bdb6b1f24240a63456526010c83
-
SSDEEP
96:8y+cAl5azln+DtZognu+mcCAaUyiKFe8LDmmIj0:8OAl0z8DjX3FaOKYQDm6
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D423C701-E31C-11EE-A71A-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a3cea82977da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fffacc0240230f40b575ac5982df49bd00000000020000000000106600000001000020000000e1f15494cd399b4d9ff089dd912e3237b025c486d528e50ff7f0044929852b10000000000e8000000002000020000000656b126759cd5e41e44f65470b55c50162ea40b4716470998f7b5b0b52d8b0d22000000014bcc2f7b1ea4d9b68ce10a175ac9983ddffced317b746370fcfa04baabf1d2d400000000b18eac285a751ee616021b0b761ae245d68f5c392696824bf22f03f0027067c0d4892feb66fa22a5b9b1a812a01143c8d781c1b71d092081b97fe2ba1b3cb65 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416704221" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 272 iexplore.exe 272 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 272 wrote to memory of 2560 272 iexplore.exe IEXPLORE.EXE PID 272 wrote to memory of 2560 272 iexplore.exe IEXPLORE.EXE PID 272 wrote to memory of 2560 272 iexplore.exe IEXPLORE.EXE PID 272 wrote to memory of 2560 272 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cc6f5ce9c634e4314eb397f8dd1b144c.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:272 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ed4335aa2c1ec3fd5b1f3833aa0698f
SHA1f0ff3facc318b57a310a0ee60ca5492863d76bee
SHA2566ced8d5ba71fad45322daeb74700ed894be9f33f8c232253bf8ea129ab0eef14
SHA512d2e658bae4701f8b98b3b86c72954641cc64aeb3aecd2777893fe3feac31adfbcd63e7ca894d1e531e7e2811de52f8ea90ac1fb5df4393cfdfd2135f69676400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bfb400f0184579a901a083f3af111c8
SHA1747984ff0eefd7611ef7f450041a17ef5a034127
SHA25656f6a0b24ac019ef19c26e4bacbb72adde56d403e3d08f79cf31ed4b44e544ea
SHA512043956e6f897ae6a252f72e9286dffeefc4a57767d89ebfcf7e9d5321d6c063982670f4af4bb622f7ff493d9221acb2506a1fc3e4ee304a24a58d78d503f35e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584a71b383bfc8858d7eaa054fd13debf
SHA14a4505a3597be681c0bda92792c3524fa597e1ff
SHA256dbfa0702a9e07ac8e89b6ad3a2d0e81d5c5001a5ac3d1235c95ff8fbdb638757
SHA51223f0ff41853a4deffe318d7b32faacc2c8478dcf8f34a8af8051945fdb4f6807138cca7c8485e4392563d95172e64426c724e7dc23dc6c3517a78ce96402abad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee1a1b1e07a9abf878823c210cc8e062
SHA1e4de0fbeef3f9a80c101d5839a199bc9a8d973c7
SHA2560442b68abc02dbc93cb2c1eba4c53b5fa2a532855e729463297b6cf92131f021
SHA512179ba625673601122c966b83b570ea7e29b8b3abb708303cb839eb2111446a96838865f775e20c632c6d6dd59049c209f4ed97a0106e4bd3d68d896b28cee14f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab93dda7a96176cc7c82a3deb3a35666
SHA143747d2bb832d1e76f30271f8724ca1cc61f4f25
SHA2563345bd670bfa71e7664ad1576399b9d8c858e49249ae89265a3d192ec470bb97
SHA5128aa6bd119e9d48af42439c902512c215159bc08aae74f2bb1b2dc735f1b2e06281b9e7b9e18d100e9ee2a78ee9057e479826e6f2b1a49188980d6fc455b858b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59fa75dbcb23ac6896c1153d5f4c23899
SHA1dc4e9c1ff4c21411249678b01289d8edb9279a3a
SHA256e2823a1c8f2211b3919f4495e32dd44e2ce8361dabc4de1e48d06ad72c9529ef
SHA51201efd4a0ffe39014985d2a9c72be541d5c3452b3dd1fb175ef1253a25ad936e2fafe3fa1f4832b2d066a98400b75224b73c5c00415312334d714be347486f463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b89bae6fd247956dddbd5e277de1fb2
SHA1f5d37394400080185d501d2d6645857da0d2d1ee
SHA25642358ee95ffe74f81c5012d90a273168f0181347206dacea946a6a0409491952
SHA5124f367caa1d06a16a82b84b93f3e905c3ec12b7e27d1658f7547ffe002f5cc45c84263d61a0bcf7e141a067f65b65f500518e6f7d64dc93ca9df2b3a9fbdbdc32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f434b66cb8f2a119f10a1aab25f766a5
SHA108912830a15e76ef19df5dd2ba55568afc9540ee
SHA256c8eab741dc26777af28e5b6e376b065b71f5b07748a7b6d02e06ba6f07dfd46c
SHA5129a6dca44ef673d008c0fe81a951796e96e7a67a765125e576e2203006848daa40cc729e82a1f20c2305a6835be4e7ce73393f3face0f38e5d6ccd8b49b54ee9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54088deebaa032236dcd750d836f2cc43
SHA1d5aa25155834de8c0d22cc202913ce61cd26a574
SHA2564db4084ce51ff22f0aaeb818c3a1a218036bfcee095156392a2f1cce0a24dabc
SHA512f50dfa4b9e81f605fb09583ae1c6afba3e8f7fa8b77aea037b4ab6510b60b4ddfcc4cfd687432d6a215817a417634b506ee19a59dfeca61561020aa4072a3b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b896cb51f273f7346a724c34ad7b0da
SHA1cede3ad5387bee2f490eb384e158d7417122d4c8
SHA2567b0427e32f0ef89ab737775f485976b83ec4c7c55d4bf1daf1848b4784ebe865
SHA5129e4e071941874b2ff42fc7d7db3baed018c83a086a6e899546cb28bf5db3a8b3f7c142c857d658325d2f740850f0e2da02e79e611786321def22e5c6bb5a20ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569cbdc51c557401a22bb3a7300d50a43
SHA17660237a3c60f98d02564b00cea3950ab7bb6019
SHA2564aa1398fdce483b9688721a432f8ed3137bf39ef4246282ebb30639a3a0a8094
SHA5123a5f2cfd6d62c0614f247054bcd62a6e8bc55ad3a5d7e8be563ab4e86fa157831f38cf6d2715de68729e054eafd4068298896aba1fd723409e94d9a462b15a74
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63