Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
cc033127adfc874a8cd9bda4fab5a6b5.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc033127adfc874a8cd9bda4fab5a6b5.html
Resource
win10v2004-20240226-en
General
-
Target
cc033127adfc874a8cd9bda4fab5a6b5.html
-
Size
1KB
-
MD5
cc033127adfc874a8cd9bda4fab5a6b5
-
SHA1
d10f4ab0da7883af4618b8febfce715105dfa19f
-
SHA256
8b2d54da5b6f384ceee4b0b410659c45fd83f8894f21dcccf804cd38c18d22d8
-
SHA512
5813d77a2052e7e826e57b098c9efb5cc0f16d4b90999d3651b1e9f808fff682d633a4577a9cf8bcb1fc028794d9b91f7ea6d95818b4e7f69d5670b8a215f806
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c2306770000000002000000000010660000000100002000000064051f8bbc1092bcd81bfc2c1abcd3315b5b4b6ead209106cb4831561d07fba6000000000e80000000020000200000001aa4c2a99e269d1e1e155694c2cb2ad18cd4a0910f085208441e5a36c0cf53bc200000000928996907be15efe05ed69ae8f4f8ce53847c14127af7c6a011d8d17a4d69fc40000000cc6097f47d17b7c3e078004832ab3380eff48bed2a3356a40e7c704113e7b5aa3111e82e4378ca9b2c150cdab2da416efb4afc593ade79d1f50ebe93d9ccbef5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{771F3141-E2F2-11EE-83BC-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a5d93eff76da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416686027" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2488 2972 iexplore.exe 28 PID 2972 wrote to memory of 2488 2972 iexplore.exe 28 PID 2972 wrote to memory of 2488 2972 iexplore.exe 28 PID 2972 wrote to memory of 2488 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cc033127adfc874a8cd9bda4fab5a6b5.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c10b8995e09be8ecd0931f87217d2292
SHA1ae25cef2ecdcac1b4d6b9b121eea408bf73349db
SHA256123e1d420fc0a423822f52a467cdc2e580a6e5bda7c2580e16e32adc07e4c35c
SHA51238f722fef4b72971ce0666b46b43d881ca435269447ecdac1b2805dd33a4a41a00240445587db873e8d058f567cb87af87537bf959c718ac851ddfcdabfb634c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5812d3a59384cf49f9fc36089df97fec3
SHA159abad5dd5e5231554ecabbca319d45069a26cd2
SHA2560498217bad208018e23d0f4d395b96e8caddedf6c57abba75044895e46638d21
SHA512fe54c263c0a8e364f98ab793d93046d296f43d108a80b83f1ff4c4346fc3adcc859e61740752489e9b4b9ddce6296fdcec29f077393228dbd389c4f8141b4638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c3349314e5aa33b08cebcdd820bc38e
SHA141e27944840d6ec0d5a19f3a6f98b72af607938c
SHA256022d9a13e465c725a8924d4c6dfa74b0dda9ea5745dae9fe5c859558cabc98d2
SHA512297ce13a1c9b8655d7ab6563d5f98bb03136dfbde945992af497e55130baccc2baaca980bbb7b42de56f26a61f62481e826d43b78987f2e362de8d1f0ab92bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c44895f1dadac1530966c08cd3d484f9
SHA17b104091e613c9f7b4b3c697a2707ec00da9cb3b
SHA2568be2ef1a4a152ed291fcba70755f9c668227f2d5c285c2f77fe40c43ba20af1e
SHA51247cd978491b95232cd579abe90463f651ebdf3f28160d06565d169d184bfc12252e64793cee3c295289af6a1d4230c109d96d3843a7770432bf598fcf2b3d6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541db32b4c03290ee748c9e53fa23fae3
SHA1669ef4870335afba15b8276a7658b03f0bf27b1a
SHA25687416b969160def11d2ef367d328245070f907a4fa742addeb1e9e096553f913
SHA51286b643b892f25d72a227b6b163b195b47c90e635f9a8e748e562465f1b745f2e1868e0b5e0f5707af4eeaa9bb9e79c219c8069da100b069ccc92628911effbe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572f940d3d10e76c0014783d0930b795e
SHA14396f3457008d3c6174eb2d30a0265f420c81cde
SHA256da5bf61cc9cf670aececae9c161db7fd272b004f27ede8a4da7ca26cb95f0e8e
SHA512185932d60e32c7493eea4e751672fe01add630e8ba27062b3c9af180dfb0386c4d68e88e388de47e958f4722c463ecf7d0ed671d369d368d8124b21c8c4916a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51347b58f907f3e35ce17af79ca6b5548
SHA13a02ffba222497230014b63fab14261a7aca885d
SHA256764c57f2ab903e869a5c314de4497d69ed06393e67f5e31252af2e7bee76c338
SHA512c7a6b99820255d418143dda8e4d962504c94233d00b55c147b3036185b897dd90c873efd2605a03165fcc85ee10f44c8897dafce62cce33d073457f22d134c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571d4e8bc1770763c36b6a9476eaff578
SHA1e7b930b1ef7660bf87dffce517caa19071b90725
SHA25622c81b871cb82ef49b81f22cd96b4751426f9a310c5fe6595ac2dcab9e782bd4
SHA51287162bd803ce3ccff558079503fbee624028065124dd2399c92a618d7fa93e873cf59abaa1e6afdb549fc516591dd49db29564342488384e7d9a416e56cc406e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d1b6256487301f3883310a32d869333
SHA18a585c74fae791849623686b55f83cd36087e542
SHA25644a37eaa5927fb897e44b985e27dfd89dc8f750e443fde7df0589dea5205e0f0
SHA512e3fd5fc184de5ddb8c8d301701c81f5f26f3b6bf2179772337fc4160056d095983c83e66a4e91ed25654d85ef2321f1a162274cd29d7c21cc6da7ac550413bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5453dedad4c9b242372e814d54af298ad
SHA13a8c81ab8d472c06ef4b0784843ed8458363ff74
SHA256628f1bf240575f4b5cf93a68f3081a815307f007e692cb713e2af8e5ca242c6a
SHA51246ac36b226a81d34ef1875be92de8378afbe948e6c8713aecab0a86f393370346cb9a136546f012e44f94f933d8b4f538e217d40641a4af3c08b53473a4bfa12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55763f50e2ff2c07e148f467b44e74a2b
SHA170ebdde5eab0a683ef502d35a37e9bc8552537a9
SHA2562f9e9f44a02cc49f1052190a8a80e13335e00fd55957d85298e8e7f438869ca0
SHA5123c8c5961502cf8cf9d56669c5f5d4117cb3d35452b9037f1c7209862c63617443f2374e38209a8c95cb0a568ac3050c8218e083053047e1322c38f062e8191f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5fd3546a8e923d8833569fc0cc0b07e
SHA151e9d4c01708ebe52627b7351eca70a56a2523b9
SHA256e9f05e5cf7297f75f72290cf231935e996dd86d23db35738eab59beae9812082
SHA51290a6ffadbd0487dde3ef0d2938f684f0f2c349cd704278e7172e3f89f520b77e603b089129894487901a1d54ab7bfe2b12fecda173a86b66e6f18b4cbebdb029
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63