Analysis
-
max time kernel
118s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
cc350f93848e24d76653d57b8fce3583.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc350f93848e24d76653d57b8fce3583.html
Resource
win10v2004-20240226-en
General
-
Target
cc350f93848e24d76653d57b8fce3583.html
-
Size
4KB
-
MD5
cc350f93848e24d76653d57b8fce3583
-
SHA1
146089cddd50f285e0a76ee7b65e1c6485f4db6d
-
SHA256
19ae6ed3e873830ab4d573b0af97b56e574359e6d056aef8961cb8e8ba98fddc
-
SHA512
aa18064e24c72761dff79eadb0de22c36a52f7839a162988ba23f4728c1b1af48e70324586676539ad9db246edfce5282a45861b91b724ce7bcbcd013811df0b
-
SSDEEP
48:DpltuDunSTgoYil5jsyGUFpIg2QxsuxYVsGoaf9piCbT0gjFCny8ZBNu/kaj2CR2:RilQ2pH2esuxYVHz3Anbom+B6Yehv8Le
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416691978" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc50000000002000000000010660000000100002000000090ace34f51117ae5bc4247bf0aa00880410f18e0a66687b4ba9dc230dc25953a000000000e800000000200002000000069d84ca55dffbb7d9c9028e5c73adf15d84bd82e2779cc05949132a815ea7e66200000003f7acd9d012247ef0ac57cb257ef2c4c2aa87099e5aa9eb5a2baebda5376fd5c40000000b2048d1993b42d773cdcee5fa6694409876122f6432067f85ba62ff077282cf43e54df7275aeb1e2c0c66e49b326272ad2e23fa89d6ff282d442624af6f6a5cb iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ecd0370d77da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56C82B01-E300-11EE-A8B8-66DD11CD6629} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2224 iexplore.exe 2224 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2972 2224 iexplore.exe 28 PID 2224 wrote to memory of 2972 2224 iexplore.exe 28 PID 2224 wrote to memory of 2972 2224 iexplore.exe 28 PID 2224 wrote to memory of 2972 2224 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cc350f93848e24d76653d57b8fce3583.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2224 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5487c2623fce318b581475985b805e8fa
SHA171084b9140f730ce7f8d62920a2fdac43b049f5e
SHA256807fe050883b262b9be81b334c3676393762da26ef29bf8a0a7bd9f0a27d75c8
SHA512fbf63f0951e092e36a7be6ca9244e9b64b9abc1604a4f59456d32909156f832a5e1476719b090b45ce11ac324ae2e4f39e0cfd15fd21e213417c09e485583053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588a9a255dd660d8ca7bbf5e2d472c2fd
SHA1be8cb3385b2eb807ad7af273a9534dd4efa9a57d
SHA256b2c1353c84aa00611543988941c5f63a224582c71a9f5546033ae1545e914f55
SHA512c77e21d8c2f0396833a034d63453e1652545fba1a321755a21f6a407186648db67fb867a3898f6574009ee84965417307706d98b6f15ccd8083569475d43903d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5431c4e03c27c7fb09409851703b12527
SHA172e210e68f67537b3ea5c579d644493446ec1b3d
SHA256da08e44d94aba85c2c3cf6fabba026e19d7469c042930850b8f2c3865a7fa11b
SHA512999b5d449395a51f1098230fbfa28c1b50be1bf57ca1a4669dacecf737b285018fbac50f8d6594fcc413fbd909eef96c421904861d733d522b4499f6c4fd336a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3149a55b99ad93f81e7d48962a452db
SHA13396404d0745fb44e87eb2bf72bbcc66bef8f1be
SHA2567980905cfaa29018d56376046b2517e3f823eebc76598469d7913f5c900ea900
SHA5129e47e2deb84b21171ee9cabcd4f19c172ebbcff99ffc32354e6427ab202ebd60230b67037ef926c439c721262849d5c710dbc61f0c4e14fd9c30da5b617bda2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a7b739841487ecb185466711c9f782d
SHA1cc21e8dacfb2bd17b5b4c77e1a7acd9fda03e350
SHA256486a192752421de9e1d291b4fac766a3b70f7e1a2dfc79f28a87337e768eeea8
SHA5125c4285a845b608764b9529e3d0b2f01123d9c03b5c1bc790aa55dfd8a3e1a8b1379c8ea9b64ff7ed736efc9f66c2536d8d589f5bf026575500e982ea93fae3ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508d8bb731b47d59ef0627427972ac2c8
SHA191f13a0e0f8db4ce6f0b95797cf95aa2cbca9b87
SHA256c4feb540fb9571d4bf3c84c03ecb9ea88ddfe14d60a549eb64d8467b19966cab
SHA51265ddf7b93fde52d77913350822a86c756ccd3e7337d2b03e4386820c8c2037ab8fbfc4859422e1966ca31b81d966c29d44bb1d88efdc3751652b299f065b32a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5307046225b29d7a47f6c5a863a081131
SHA174da9d9ea5a1ff45e09e8ac34a25d770f6b71b4e
SHA25630765a688d2f34014130af2f87bf247211ec146b2302bcd6cd024c0b1cc381e0
SHA51223511ebd7f3c42d0660263e895bcddddc725ad7c47a24a63cb4e2cb39a0fac8174ebe85f5986a3d4ed6de688f0ad10ab03704e910305c530d7b807defde338fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ca5d487a9e1b9e76704d19803ee5d39
SHA18d8529c10a10198e7a5f42a644f0021121db8f8b
SHA2561d0f36251de915995ccc589fd63c3c648fff718790d5feb4e0d59c6d19c33698
SHA512e135217f19b989c8e93d4e43994287bfbab84a5adaa8f6edebdcbd6d0cd09d30f4c4ff30e8ea80a5f694d973c1f94df07f1c6435462e2a9fd9b644c341715a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e8127fc43d789940fd82e872bccd42f
SHA120ee16951fb91b006c3bb737a136ceb594201536
SHA25664c5fa405c49f890f43a881722d069db40103709d73569e88e0e81579e905203
SHA512b748a4d31e132699e69de6dba1ec582dc045130f2a21ec866e01cf451a91b821e48d4bc9045c9bace6e210a939fa92f5f84578b737a83186a96487e78382cff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54613ef12743f3ec2bddd1e94e7206f4d
SHA1700cb3c0572d984978df9fbc1c3181d32d8713db
SHA25636ee527c5a036800083767d860c7bf530836739729eea6c66fb69a6539a3c8cc
SHA5121ca3fbe8778bda3911f119fdc2abf6f9d07c59d95e49f6122e8953fd15878c3ad0caa998feb02aba341d34256f266f8d724d82b93542d7056f3867c998bb35ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b532d0c2b14d754da70b2255f59bb586
SHA142d5e8c6008ce04f4829d55d6b2e969bbad339cb
SHA256c95d638e270d5a5808a8a9ae3a38fb1acb39a9de6622e586696073c332ea0a5a
SHA5121c70d42bb5222e97975a7861793089ff6616c727d579b8a63a56c8d00211b2fed453b5c449f71dc9db54efcc7b58debf99b8d23944afe7c2e4522b84127d14f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5902992821246d935af26a50332cd42ec
SHA107e78b06243da83c71496bba3f9b0b4a080b6ef5
SHA256d73cfafdcac82a05302d41944f62947b7dc7d68cde3b669cacd0d4ad74554ece
SHA512314d083f3b56342328a1a58454716a9aa66fd19b5660c4c8d7622040058d3909cdd1321ce5726732d07ec2626d60ea8abce27c0b764514950902fc00b9ffae08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597027cb37f19a24a5fe974719d89550b
SHA177ac0aee7ce2728a98065b96fd0833d8428385a6
SHA2562f957ce0e45ae918189ece07565554c6d4e086759b7d6d2a065b258693300931
SHA512c46b57e871c402df6bb29f5cfd883d90d108e6aa696764034ef89d33c7465ecc21982baf2a388b38e652a214d3a184aaf678da20fe141e8455bef8e96c1672f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503b9eec0a8c78e931f6f3438edd9296e
SHA183d1aa199a31da0ad706160b8108fae4b0629ea4
SHA256cf4982e4e16ce7725a8fded87aa165e904d64099096a092ccf9df655390adf67
SHA512fa98fbb76742e32a3e674021f9077635b02574e8313b272ba445c02d79b6c3cdb5a01f1b1d7ea2ac235e4f19fbf0f5e427484349ed7999215edb25c8ce0645c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7cfe94e620e4a07c6e8dfca2ebed973
SHA1baa17b1f29bf2c5f95b922b4a45cd443703e3e30
SHA25663e0769169478036bac279b5c324320c2bd856ef83d567907066cc3f050f6a28
SHA512a1f1000dda4713b505576637c29ec7d72876b9a406f2eb20634db7649353e794891d3d9d497af3edbbfe3803c20db4e04289bd2eff8015159684b453dc160609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de803651b091ab0f29ffb09204ee0eaf
SHA1a3fea88f3600d3d1df2aa055c0d68176929bbe94
SHA256034c57fd524926b0376ad19662dcaf72a402076795a6631f58c9596f05f46c57
SHA512d4ed0877763e127896dca55ad317c527d976920d2f137a43e7a008d45597b0cd2bb4bf410bbc1cdfb0e36b39b2975b89f47f0896fc6fb328e3fc045f80ac471f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b1c62aff3efd048d16e7cfddb53a415
SHA11e004227762ff295dfb5c61f4394e8441955db2d
SHA25627d79e0ad49985ed2847194b0c3a1d7a720ba8a96f12cfcd894107e0825ee98f
SHA5126c13f63584be5bdc83937b62e6620d2dd75aa0ad4e87c84aaa0aab3a99bb3da2d5b7beb8a736bb82e2e55697e7c16da89f513c38cfa3ee26c6c0e0f979147cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ceaa3644702be13c297d621d4f46f98
SHA19d3c706e85e5d333514c0c00a7af0299b5981604
SHA25669a201bbc1aeca77ccd7b244cc8e60e75c54dd4764b92f26841ec099e63e7a0c
SHA51295cd9bf953190569e8343617040c1e9fe7e245eea09772d218743cb431ceec90dd8ff71cf2fbe5338bc0c68a354b2a99daa7923f311a5d3ac86fd5f20e296591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecb60227e50dd1c2001f067c795b3b48
SHA12bf6e96f1e5064aa7010d89825ddfe10b8474f1b
SHA2564e811976bd4f2e6b4099763da4618cad9025fb5c3b4c4ce1fe5b1ba69a42f55a
SHA512b5b4288f4f7e3bd096f5e87cb42fd5612007fe03ad5bac7a959066da8ff953cc9a7e5a44bc489958663308586d903774989caa36d23ac1c561da5ba17d53b640
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63