Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
ca7baf65e64fdd350863fe3b2370cc04.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca7baf65e64fdd350863fe3b2370cc04.html
Resource
win10v2004-20240226-en
General
-
Target
ca7baf65e64fdd350863fe3b2370cc04.html
-
Size
237KB
-
MD5
ca7baf65e64fdd350863fe3b2370cc04
-
SHA1
9447a0a8aa06e7e2875dee1a5f450a176bd22f36
-
SHA256
82196972aac9578e6b49cb2e6eb2ede4938127a9d8d18f2a6ab6327eabd17c32
-
SHA512
f1481b84212a69be5cb65cd3bed50dc7f56367a62f17508c826d4ae9726336d2b082eb8ecea193685ce331e4aaa7002019bdf73a9c658e7bdc657a5d6e518dcf
-
SSDEEP
6144:SioDRCixVixc/sMYod+X3oI+Y9sMYod+X3oI+YQ:ToDYixVixcD5d+X3P5d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416638607" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{134BFEA1-E284-11EE-8165-E60682B688C9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2504 2372 iexplore.exe 28 PID 2372 wrote to memory of 2504 2372 iexplore.exe 28 PID 2372 wrote to memory of 2504 2372 iexplore.exe 28 PID 2372 wrote to memory of 2504 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ca7baf65e64fdd350863fe3b2370cc04.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f915759f931e62d2485c2d6a17d18db9
SHA1e90a529a21a1bdf5dc4474a8042896f0783080c0
SHA256f935e47aaab23961aa7325b9379b413fc73e330ab07a0610956ecf96848d5302
SHA51286082cf6866a313b307517a29e2fbcf78a40bb3304991d7f0aa37717099e47c127c28882d1813c044ee2b9313bd30adb599119b72a6dd156efab2d8e4921e21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c9b03f3fa4a29f8580dc4a1037c81fd
SHA1642b99f1ea30169809366fa7c7bb54629fdb2eb7
SHA2563c88b5fd4e62887cea4f6793fb4613f43d2ca2c4533457b5aeb046f4d65f0fd5
SHA512caae4222a13ab7c616d6f83d6e29b2616c0adba08439021160b319a57b0f44601e3e667ebf7e612c8462866e3d16758eaf50f19133eea237373781b29d11a187
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5256d0c8e43f10904ac3950f43b65eeee
SHA1e790d37b5dcc0389c2e651ad9dcb0097b7518622
SHA256f0abb4931fc2eab37e33aaf705b12371df8b7871326cdfd63217b9dbaef9f207
SHA512181b45baec51c3dcdda73e6cc854a788c5163610d6e50f2f55f44aabc7d47edad0403064c0e50f5d506126d6607737f9d5d61cbdf3fe9c407e6c0ccbadf5df76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d21cc283c8b13be9e5b158780bfe4229
SHA15b6fbb2a102dedee315c5c0ba7101d32e20219b7
SHA256e76477e0d52ef17ab672b86fa6db043d5433cc23686d1c873693f1a4d9cce287
SHA512e4bb60b011d3245183546f2440bd8cfccbced4c1215b8e5c0a9ba367270b79ac4a0ffcce4f90bafd73560167819e3f988389195f707ef0362d623485a35339d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ce42591040a04152ede197ab3152bdd
SHA1e2673a549e04ff4fdd6d1eeb07adfd2762b3a43d
SHA256880575d7e3683a05ab6c6d94a55e6953901d7217cc17dc499b975faf39f9513f
SHA51267cdff6c8f6f957c05d83f39575cda8afec83f5eaaa29929ae5922ffcdd11e4378154b5bcba87a2f4774481d9116ceffd3e66a47f4f0a215b1dce07c0cf776ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a932a6c9cd8371b8b987527d04b27a9
SHA12af977c4e78573851b18abe004cb1d4b67985dc1
SHA256aefebc9ab0453d6001ca13be69e6a0f4cdb10666b19bedd7732c272da1efe677
SHA5128a06aa6caa349993de0fdbfba3cc58e85f347fcf8498d0f47dc58445d3674cd0fabcb175041ef23167f4b26e8d2fb6aa62b3930bde805c81838244d98122492b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564697fc41a649342072a60f552d33496
SHA16088987aca3efbb98030aca8982642d7e71c4cb4
SHA25684d547daf37ad369fffbad83648358602b4ab0b3a3f4ae6f6755f7185051991c
SHA512e41ee74cddb37a144086fa6cc46ec0f8a1c5f71ed1db9fc3f534c65757b7cc1f43d6948086c6061204e54566f49cc9faf2af31e00729fdd493c6cec43f6268f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eabdbb6208e02a890000b7aa522d26ee
SHA18480fdd5d559fcfd15d90f6ffec9036fe57711fe
SHA2563fdaf582c2eb7ff2ec6b0d76b503bc1f7e18e91f3070b37e684c93c1a369656a
SHA512b5c56292c9f78d43ebd3e883090629e9555d7bb5dc72d89c9536a2f7c3ace89ba968c63209192151d2988db4db5cdb4dea860630572553b4dee93e693ecb4f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD516fbc309cc64b35ac4a41ef242dab4d7
SHA1141a7b620c0c6446c3e668e4662dd3982e0b1399
SHA2566bd2d5aed4ba94b599bdcf30bdcef928e91c7f8a927bc61249533fda4e9a7273
SHA512a1203b4e6d34ad8f56cc72f29f75c1b4903041eaf8eae6c209a2d7d575cc4df3138ff71d745c2216652f8fcdfe08793a2513701399fc02fa3dd479f75c1e7651
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63