Analysis
-
max time kernel
126s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
cbe1f51aef850b344bd1f0680c4dab63.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cbe1f51aef850b344bd1f0680c4dab63.html
Resource
win10v2004-20240226-en
General
-
Target
cbe1f51aef850b344bd1f0680c4dab63.html
-
Size
42KB
-
MD5
cbe1f51aef850b344bd1f0680c4dab63
-
SHA1
cb19ec760989376b0b2096fda0c090e4a27cdddc
-
SHA256
e6812e4ad837e5047df0b9af02efab5fbb5f697554d89ab5076da95067f73fd5
-
SHA512
7ab231cfad82ec37ce6c7865aabbd44131930a4bf7127ca43348fa1ffb6c08a10ef46c998a008b6aa3eb3a18fd089a3ec34d1c380a91eef99c173225b99556ea
-
SSDEEP
768:pOTKNPw8rqoHqKbqNYNXNtNON0NBNEN2NLNsNUNhQgh6xLZ:pOTKNPw8rqoHqKbqNYNXNtNON0NBNEN1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{129B3151-E2E9-11EE-9183-CEEE273A2359} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416681991" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2780 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2780 iexplore.exe 2780 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2628 2780 iexplore.exe 28 PID 2780 wrote to memory of 2628 2780 iexplore.exe 28 PID 2780 wrote to memory of 2628 2780 iexplore.exe 28 PID 2780 wrote to memory of 2628 2780 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cbe1f51aef850b344bd1f0680c4dab63.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e84e7748c554b6a73eb6d890bb8cb5d6
SHA1362e97afabb650febe1ed955f4ea9c8ce9fcecef
SHA256040d2ea88c04531f33a49f9368752c23c2a12e97597268895c18bb5093b5057e
SHA51230f1409f82819e77b18c8d70c952312b1bf7a890da3f0a7565a163fc5069428f0df839092c9e492f87349017b90db3a0b50e1526d334c03623740b001e05c7a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2210147c96c10415e8c9972394e6555
SHA1ebe05c00e74eadf2ed41d5a63820eaf4b3223026
SHA256578738286187472312d8932e1500946407d128682bc110c3221e36be271e7ec8
SHA512cd1ba48d246b4be4bdd8f5da8d184862c3ef190b04acbbb563bf2f79745173a0cd70c887cebd1af11d9b481abe2ee9dbb2a7d2cb3b8cf92dd585979fca39e9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f05833f9cbd95bddd597d5fc5283b10
SHA1b071b92285aff00124add2b6232ae3d8411d7346
SHA25619909b5e162ce74c32b01e8b0ffe004b83a83077197958f2b815a3a383f6dd1b
SHA5129a6e65a36ea2b35fffbc2b68579631473fba03c55c831122652dde205775bb80abdf820d6064eac29b26cf10882d17e75a8852b73bfe77842c0695eb47cc989f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571d42938ab902b152bfa1f88c3b86f67
SHA142c2bbe19034b5b24774de40b98beace9b7c8750
SHA2561a8099a67a02ae1754f96475a26a439ac6b61f3d546283065d38c292c2885f58
SHA512df7e18259e34da041d0b48b314e5d8c39e062383a13dfe3ba5b5f0fc2a208aaecb27fa0a048d5d68d9ea62bede6c1a3e69861cac0094c42492e50b5d24f5a3f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f1cdc31af1f6d539a33f2a9ae894f9f
SHA15cbc36d0978ae55158adac3347e215ff6ac616f1
SHA25653b00d429f19cdf8c12def1eb1a2e6ca50c6f4ea115f7c8af465f3875dac07c4
SHA51223fadb06b2a663d3bc0769aeeb5cd6369002ae89e9a49e51d9c72631f5269d9403fc54a75970df4ad7396a40fefa72c617e5c9e33f2e6bedc6b0c71076657a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51eea95f7520796275fe5d7c7a86476cc
SHA10c56e837902cedc59c1c6b45765a289c886a5cb0
SHA25681aa41b34b390c35cfae996bd1d9ec994acd100077a75b96821378dc415494af
SHA512596dad5d395b0f61e53c53343839ff3c20326740081e135035456a2f670a270c262d57d42af6421fd6711360f6ea7c8952d84184cb1a00640b56a56a76f64202
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63