Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
ca697cdf71159033078dfa0baef48856.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca697cdf71159033078dfa0baef48856.html
Resource
win10v2004-20240226-en
General
-
Target
ca697cdf71159033078dfa0baef48856.html
-
Size
37KB
-
MD5
ca697cdf71159033078dfa0baef48856
-
SHA1
0d62b42e0094a5a1697054c6a9f69b0627c7c670
-
SHA256
6c46b9e960d4020e564f019542b163dd38660f6380b67ed90c42eb9ee7042550
-
SHA512
08e7280712ea0a4de6adfa5a7525fa8800510c46daa4bcf75d77a7c408e2c69025c7ed3955c9902807509a051e2ad4794dbf42bea27c2f00265dda502cc388b8
-
SSDEEP
768:CyiZ4E9hnEZshFWMDWZC1a+DgG3r/1TGPl:CyYzOZC1a+DgG30Pl
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49573CD1-E27F-11EE-8A09-FA5112F1BCBF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40db63298c76da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416636551" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c230677000000000200000000001066000000010000200000003cbce639685e3a1f382d738cf127d3ac8c0fa8eb3cfa54ea1442b00349ee53b7000000000e8000000002000020000000bf6e28c22db2267407bbf365256220139fc1c4298d251197a59973690bbd066720000000c63d88bfa0bb5b65952a5cae602e624f9812cc86ff121dea08915b491adde498400000007f3bf684168b660863cec1aad046fee8271bf531e768eb740892198068c1bfc635dcdd66eb7ebaf2c823654c3fbaab3443aa2da55aabc00c4bd193e1ef6e4454 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2372 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1332 iexplore.exe 1332 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1332 wrote to memory of 2372 1332 iexplore.exe 28 PID 1332 wrote to memory of 2372 1332 iexplore.exe 28 PID 1332 wrote to memory of 2372 1332 iexplore.exe 28 PID 1332 wrote to memory of 2372 1332 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ca697cdf71159033078dfa0baef48856.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1332 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ba28c3b13e3fb3cd4ea5f798cd4b9cf
SHA19957960b7b1fd3beeebcd3a2fc86a38d00d85e52
SHA25617ee995af9af259dc0131b54243c21dd717b44ba4b8808bd7518113160b0b546
SHA512208e70b21ed2d184e75f2c0f43768f0b4a2d2a8e090fd27f645b0c622de5bb99c32ae13c1544036762e28e878b8344562808d4614b8f0a09dcdb3ad3c2fe4fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5cfcb76d10f4e5a843a2dccbbaab08f
SHA1c6651f1495d6d713160b06a27bf9eb39b98f43d3
SHA25607a3b47de9ca85dbac219135a20dc1b22325532bc99815ef28bdf3a53324f2b5
SHA512a11b0ea2a9b4067cadaa3887d50ab5b4c2d605cfcb16a5c4e61bfa3939d7db6a0b3898390ab54445bbd6e4b044d42e726b1135edbacd252e13d639be78e8a9ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa024cb64302f83236f61294e8e3c1ad
SHA164b2009b719a53377eaefbe24b1086eabfbe6c0b
SHA2568a629161817fe83451d9ba84ff5e8d50bb2d1975270c0ca4e97d4a3ff80fd14c
SHA51275510c9843789d1fc9b59043db5c7254f00b5f6db437096a497b66048c700ffed0df0ab2740c6cd51613936f0d769b9bf5c5388a0b28335a271ea698e482bb14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f83661c3bc8c06fe768e5042dfd62520
SHA1d432dcdd3f5c321b56fb2d0b2742904035317646
SHA256b7ea51b45b1e9c62d91e032696d2835cd0c481b563f6ade513d6b4b495215665
SHA5125f87d0890ffde9eca5f16b594d8abd52ea335ba5123142de960fd237f046ec3e09afe8dc54633bccc7d96960a039924f1ce2c7d01f02fa712dba14eacf004661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51312c4ef5fc477432bac0fe54ef99d57
SHA194531b7d264114317b694bf87ff20573e978f6f8
SHA25611195bfc0c4664e886664af0e33623ea4f508d3ac71bb235254cb3321708f10d
SHA512c51fcc0b64c26c6a7f7f4d950a448476628ac4ed45a28d0e7c4624fd6b76b1c9761745b4817d1db6356ab914db3c6af64e3de719671ea5abc5d67d0713c1a5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5075dd154ab882dd6dc6461fb383da4f0
SHA14c90499a30e5999e9cd705849fdc5062bb6a8f41
SHA256c1a99184e192b4332117046a2e9ec805abb2937abc8eba6f5f51b2e16931ed43
SHA512cf58635d198a9ff3a66321f26a448bc4942643dcda6ef44e6b6efecff8666704a14cbf612726320572b3993a38cdf69bd13c35bd2e1b2030c87968b808bf7200
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a167ee14bf8728f284c2f8c0735bc290
SHA172d05e1672e7dad1cd5d90355613903cc4c50363
SHA256b1ed417e715178d49b9867224b42f022196c7de7db209bc7606660e6523ad6d9
SHA5129ecc02afdd3cda3ecfd85a27438525949dca00953e207baf05b338ec42066f34d5c7f9c33a700c6f52055fb479e4faeca7a55cb8fa1be6c98f44607e0fd037ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bd24e34ebe3213e2c64fdda792e63ce
SHA1f07811721dfbf6deffebc6c89726e11241f5a1c5
SHA256bd96c9bdd68dd6b23f6745996aa42db022004d41e545b0e2f9763fbe1644162b
SHA512da584fcb940a39606b0e890791fa7751ea0f01b33cc526f50ee7bc95db0cbf2648f4032cd201d6f2a4cf3cde73a57c3575da5723924d9f63a27b4c30010979af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb6c1f1924c6e2b1c3b66861c83479ab
SHA1728872c8240f47b8e47372810ae19209c11e0a2d
SHA256f1e9d389448c4e7f22e038265b7699bf8d6522b1d576a62b3ee7feff079dd30a
SHA51269bbbc7a07e36685e9a7c91b3690d329777a02bad349fb9a83f33ad157e197a62cbba1082b8b48ba8ba31773b1897054e3cabb365c60da5ec4dc6e0d873f00ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0c8aec365b0cb9f7817494784c6c9ac
SHA1d6e9dbc8000e3ce5c4df176a642a482467d3f276
SHA256361711f3f5d07db2128e29af5ea61811f0071f55d07463af0a9af47ac44e041b
SHA5129fdcd616a1e6c243d166e243f8a176f17eba44049a8b21927da13a6fcb7216980870b8c64d186a3a0985fd088e82dee47adf50e835e928711a13dc09679a3c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a56b16117d689eb6f100280610a10a88
SHA118fb73a21163450cac6f0b37b72bf152b912d322
SHA256a36c488eea1283355237043d0b96a37f7b5a7eef45095499b2905aa0752eb0b5
SHA512e4ba5af931e321182a49e9ed83b32600658a03f8bd573ac4a13adcc4d463a865caef860a92e41ec256264464ac4b04b91090ebe4ac4cbac8aa162ff2ab819c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e5d7391031e5f0e06a54ef11183bfe8
SHA199d8f71310ab71c2042beb137efdb754fbf2ff2e
SHA2565266b16a7de3c1be5390fb2f9fe7fcfd4fc133f01513683e3c76e48ecb18f6de
SHA5124d69e839b4714666edd217d857d3495c4513a735804b40736f5475264ba9d2935ed7ee7cf91eae4a86fb91b549a6d1696d3bf0852d973c4897b765a2752cd345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bd5dca9a1fca23a36c904e1e13a523e
SHA10e1e2dbdf55b872c4daaf49796b70caee2cb55d2
SHA256a237ebbcfc590d90d46c018506dfa7d9850c9ea7de87d60ba081698342e6fb5f
SHA512527b44dd71620df14e4b3d76c9743295dafe8ae4757d160aab22c306968885158891d0827c555dd7e4481765f0a7697213a85c48dd757134ebd1df0ed24e58fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd8a9f1e7481dd7aecce0b70741d6649
SHA19ef75eb419939baca42d1efd95a61e1e736fbdaa
SHA25637d19519d9973e1d1c1e0cf5dfd2c719c4edb977932a3822c8901fa525f043f5
SHA512377cc6be89aa26258dcef4080eef1f6ef7efaf6619542fb9646ec48d88cf1567911515541fece23683cee1e04d83f25e48507f9b23fad781e25a838f44826e6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bc1cb52b1d173e6258173b16a77ee35
SHA1461f72188b84b8e5e1b7ba3c1f29f3bf25ee10be
SHA25629201a39cb79102ae1c5a7878de52ee5f3190385841e7450db232742df9c90bd
SHA512bc46e9d834d0202bba2f7ad3f6876b9332b34d87aa53b12016451ea78a213301fcdab4ead145aec8b1ba34d71c69a6e2d33535e86338b4767fd3486863ca89ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bf247009d6d0029193409413550b8be
SHA112b82e4897f1def29d240b1abbe6620220158672
SHA2561a4d642f0bd36603123933ce6e1b3a91744d648ce33a15687341d9df7bb2af37
SHA512e873b322b981c2088f2710002aecf5f75be770a60eed74447a997804ff3f4a3f6529c83b4a3470411c03b2371147da685984eef559b182649f341f92690d03b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aec780917d351ff98447a50347c65480
SHA153211c87bf9c9cfad702cf474086acbb702e514d
SHA256a8c888cb1e6cce9ed770664756bc995eba663031891b6a46eeb36d0c1cdf6914
SHA5125c9e5c1ae5a016757b534b966970b7884e14ad157a0e9508286ab0c29500c844ad0f77d27edc6e7c135aee5b5b8125e2a3ebc71f8417e9988d0411261f2a656c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63