Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 01:11
Static task
static1
Behavioral task
behavioral1
Sample
ca1a8a3be1a064d918fc44af7659e5c7.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ca1a8a3be1a064d918fc44af7659e5c7.html
Resource
win10v2004-20240226-en
General
-
Target
ca1a8a3be1a064d918fc44af7659e5c7.html
-
Size
2KB
-
MD5
ca1a8a3be1a064d918fc44af7659e5c7
-
SHA1
6fd259b9223533aa46c88396d81500e47961e610
-
SHA256
1ed367b261cf9ad85dc7ddf5c739184fac9c2135957da05ac5e61242c9775ee5
-
SHA512
cd07c416db9dd8712d191e5f90f7e60fbf188c802ab459aeb3f19665d6e0d068b44913a5e400a6acafd3ce151d69178d5ce1541128527b129596f7c546948fcf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000009aeec40e2b8259a0804c0cb598ea5ff4fc7589376d2dac0979ddd060ead5cf43000000000e80000000020000200000000bd10df5a4ae63f96b36d7af2e071dee4117ae5568120865394751da55c396e790000000a29822955ae9c50dcf7908f7da2cff15737b7ed9416fba96c68655050ec21bc8890554684d6f4666095a8e2dc7236de8a9911fc517b0c77a778c13d954c20994bfb1926b1dbc9304e3fe012aa750bae60d3a85434e54fed985641698d1ebfe9bebf09296dd82dfb4db5e824c8e7c2646c5789131333edd4e7293c1278fc224f4db573f59b523cff499bbe2fc9e63470640000000dc905bd27363400fb192e2d05d69b0f0e404bf7e3cf26a4085f7060efe5a47b21ae2c6ee4412dfd667512483aba010f016e401a8eb2f73d52308cdca1158546d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 006127c37576da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000fa1e08996c5bfdc772068539b8b89506d0b84d0919eed7f61a07a5a22e84e0dc000000000e8000000002000020000000c4e67e67dc2095f3c93a4ff25583612182f5e38a4444ae6725ce6805ce0fa34b20000000048967ed82d6692dd6b4436e35da7392c0146e10aa1e2a3e127a1487e9f31fc94000000043fc6a0e5e5e6fef1aa968147e9602a4dd7d28f4f05a713418ac50c9b6500e22b7ac2bcdbc76eeff2512cf4694cb95b4bf374cc553a4496a790d6875b96ffb37 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416626948" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE9EE921-E268-11EE-BE0C-E2E647A5CFB6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 3024 2912 iexplore.exe 28 PID 2912 wrote to memory of 3024 2912 iexplore.exe 28 PID 2912 wrote to memory of 3024 2912 iexplore.exe 28 PID 2912 wrote to memory of 3024 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ca1a8a3be1a064d918fc44af7659e5c7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ff37e3ed5e172cbb4ea86078b53e4e9
SHA16cb6f4205e231be36e03dcd9d3822d7a1e71f06f
SHA256085204329e314979b024b70d3e94ac65fec25053e8e5df9a63b9cda3f048c603
SHA512405af98af12c569e2140f038d50a6ddd0a13094ec8b95828ede5669ea0d7574a6e42dd6c1bf09fd8e136850b942bae6c69d7ee7b30b12c0a04182b44f9ed3e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd504c1994373788c5a151703fb7b0bb
SHA1e588bd544dabca0675be504471d9075143b3a26e
SHA256ddfe25a3b78eb5d7420807b3958e14b6e75dec617f7d2121aa7cac15d2a756c8
SHA512596f2f8e66732d9e62ba51f4c1fe80649d4d7779c50cf3f5159a44b0947609b7a02ad21e22df9e0edd025deef24136b00d013d63a110a88cc416f274e749f2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5634f8ed73efda4936a3c0452fc0c61c4
SHA1ba139c2c3fba911e0f01856386c2d32efec35cc0
SHA2562d31124c3f4b994d42888fbf3c3ddc0810d6bef6485891e6242643432a22b16f
SHA5123de38e59b495f3f4f90473413bb8f0a5526b947217bdf63939e8038f0762ce181cf113df8eecb8261296e4feec37a062c4c8d71d437eb2ca416362d5cbcdccb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521829c2782c60c0e4a264f88259379c8
SHA1b7efa53ee0f1e9019ae839841a14a582288fbd7e
SHA256da97dbe7549954c28577f8fbe6d32a70dbdc057d09db42866bcc405befabbf3a
SHA512032c25b27eb25e7895e24be6e06f9072a360d5281404e1ec4cc1aac697d8ae1af15af9166623252942a1ffe5c5e65ce4a6d1b15d1d2c02e6fedd9cd26b588eaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576ff1372b0eeadb13c2fde7def6d054d
SHA12d345428f138b934ec773dac0226447239b41d27
SHA2569680f8bcc9da40c1161f80cd79c254da900ddb9376d5fd1fc95d6a2a72262ba8
SHA51241e4f7006b73115c0c975d25b0b9c9c34a0ad43da959799d2cd1cbfca076f9c0ff3d8196e07bffb92e30fa01c537d8fbdbd2ed7d206a6efb0f5bc5d280dcbfb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb955266fae6a9237edc12263e6d1bd6
SHA13e38fc0e6177478ed64bd1b4e1101a1ce2f7d10e
SHA256776dbfba470f960ddaf8766bb5a6e3b6bed001b740e40a6195943a256ca9c1d0
SHA512e19ee25c9e64c8e1bdd3e829026faeaf40709f962eb1b45f666e3b62094097990853afcdae6d041f7c2bf49491a1a56226c9a06aea3a8ad874e42cce91b09444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d8db648c8e97d0e51ad79dbcb1cc43c
SHA12e355dff6503328d91cccf50869eaf771a0a55f5
SHA25639b5b112c1ac5ddbb0a3344a96b55600cee5f9f9aa29930ebd788a86d5f7e16b
SHA51270de0379292685e0e4e2f743be4882d6ff4cff65d23a0aa8eb449c525a098c8a32ad6beacc0c1c6a8ad3678526f89d61e403d7a392914f4dc722a3fe9ac28b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576a2cda1bf3d3450831e533875fc0a68
SHA1265437bfcab221eb24af4eb9875037dd3df72b47
SHA25623288e40ee8b81a9fe86d403eb907348ea319b304d40924948e5e7d61ee0c761
SHA51279537cd17ef3154659b537fb71a08b2aed3afe7ebb797f9d72b81ca66bcd6ed2cacd2378d2707b83b39d1e6597798aeccd14cecc779d0dd4902ab57922a4347c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4444d33a2734cb5fef4cab78a0ffbe9
SHA1bcfda09a8c1100ba79180f8ba909aad2075814d0
SHA25631ded075162f2ab300c99b426f6c2da1e0df0e3ca627cfe7f8d68be4656a7369
SHA512a92c1c1cd082806e902fae481c90bb2e1b158ee8ab824e1135c42b463f26f57c95d78f7b06f55735982a3d34f9d9e4a7488c798b8636a60f88e739dabe033e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9a2d32b280fd037f495bbd6b94d9c3d
SHA18c2f1aa81577c1e2b195dad21a10a5a89d776719
SHA2561b51e40d2abe29e3b6bfc5d946dd376183c863ec1bd277030e661964db421e70
SHA512d562081d9fec0a9228aa868d7858aea150fb33004724b11d331b753402d4eb66839bf8928f0553ebc5034052c2b3d37972c9162d9c17bf1f3230bd06d525669e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515d2551fe7724c916e8e3aa10905dc22
SHA13c04b46308d069acbe835830ca2f961f56a5cb8d
SHA2565215574efbbf800c8b07e160eebbb51f5440e0bbe17bfb1e9929f177d44831cf
SHA51256f77a65c955bd1173dc18905ce6254b70106596d1b16578cd906e44f60e3e47dbdd99d2e1791f135043eeae0669609cc816c89965494cd57f7ae690686a06fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5707f597dc14a1a5ae94fda66701456
SHA1fbdfdd623fced9b271941cae84ed2a7e39e35ef3
SHA2564d735b25acf769bdb9719275739f46808c1e4d499872b339b166e4b5e3f06b94
SHA5125e90976c84385e85db1cf2e5b9c54c68531e230a7242ad8352b0aba837c324f7b272781d919540a2d361239e332cb994f0c1473641a9e7071fafc4a8fbcfdbab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502d71c3f0b0cc87a8a4ccb7973581932
SHA12d7eaba56a238f88957f154d7254c3084d565efa
SHA256956b700d15b16ed9fb540131339f858c607773331941263068e8673273d54080
SHA51271eebf960161341f3249e979f147848611b75ea1cba60cdd5c52971b6d613276ab5c8f6cbab894f21bf72afbd9a8c8657b97f2fed6d90214a2c56fc9b49db745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5425eb60d31f7989863fe5500debc3244
SHA104fab1fa4cbeee91967dc77a3fe0bc41fad241ef
SHA2565c64b596756b394c823b18c7d2746131c0f2d6c2dc988c4154b570a8e59e3083
SHA51207e79a32b4ab58a54eb6843f46aa673c1b73cce5070b98bfc44848b250579003c6f83c0642595bb5bb4b99804789125f6aa32f8ba29f5a0cc499593ea332326f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bafc71f39137a4d966c3e668f0ce1c36
SHA15e26a0e35f01b3fba123a27f20b26692845af48f
SHA256cb0e23ad1ed966dab34d612366ed7c36b41cd24a90bcb63907030d2bc51b5a7e
SHA512121ed479bcf186c7505bd639a8ecc68fc406f5439cf8653c069381b0802ec4f945f7412192d43c38106725c3cbedae9888f268e5a3d4659d58c18b9f21a50509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590396e4efad44c4a7d6aa5505affe002
SHA1eb292e281336a15468f05431cbe8acec14763819
SHA25691bc7f15370a3e39ccb06889f4d295dae88d2c222a98f679a3a512279807bf70
SHA512e5ab7f5030f9e8d27119ac64f2f8e27a9e41fbf75db4b073a7de199b105dbb3028501fd1befc517ba1fc41e1155f774e0831f78b7100bd3a7deb2564432dde39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9604d2aa4fa8fbd87f8dc7bdc6fae03
SHA1479ee086b8726c2cef2e7f94bccf3e68ee4d444e
SHA256ae52a4a6f54c09a897b4608d74b688a03ca00e608bc47ceb6ae1b626f269b97f
SHA5129d9832871f10e83282fcdce5d757c09f773b088d9ab9545b682c80bfb921b7e9bace73137ba59ccce88e1414e200eec560ff5a2161510636c2496cd03539b640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d88218ffec2fd864a4a13c31972d7d1
SHA1f8781cb7b846fcbde439887cfba26cf51dd54ff3
SHA25629c958b524b91bcf4f11ab7cec7fefb6f8d29b1cb55aabd014ec990dc43a639e
SHA512cdd261a7d58cfeeb6899fae03b13fec93f90799d176427dddd76d38057c2f7b48002110366c0e6fe601565d48522083db3cf32db012169160dae5eb8cfd9980e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63