Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
cce4f2b2acfa122a13ba26fcb1548ef3.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cce4f2b2acfa122a13ba26fcb1548ef3.html
Resource
win10v2004-20240226-en
General
-
Target
cce4f2b2acfa122a13ba26fcb1548ef3.html
-
Size
2KB
-
MD5
cce4f2b2acfa122a13ba26fcb1548ef3
-
SHA1
f90ca6918e701d8a88d4063b60dcdadbfb7e5ac1
-
SHA256
485d3d8a964c11acc84924f9ace70cee0106b6b7c79798836840ea57a98f0380
-
SHA512
f329e78968e754200e5042da465cb61679b86b8357822a02f6d5a6e5c174fce5a26eecdc9fe1efbbbf1955d3aec3879e4bdd09cf8c78b722169d07bf009c1317
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416718492" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{131E2BF1-E33E-11EE-8C0A-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80bad5e74a77da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c23067700000000020000000000106600000001000020000000886f1d4e78ea72d66170d2a1bb8a312ed12a7680e7b74cbe98d21679e397c55a000000000e8000000002000020000000e2d0a9a45312f4b8bb491bb62f09c98efb4622796425191f6765f6769b56417d200000000a3d98f40955bbe6ab8d5ebf69ef5f01d86a3a824927dce9d0c4a36af99ccf4c40000000edf3028bf2f018fc674cf898a87b987805c22fc349740cc2b54b2354f70056e79f9cdfe6ac8e35fb7540f1d5cf3e47f1769557a547108e89ee8524cdeb045bec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2200 iexplore.exe 2200 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2068 2200 iexplore.exe 28 PID 2200 wrote to memory of 2068 2200 iexplore.exe 28 PID 2200 wrote to memory of 2068 2200 iexplore.exe 28 PID 2200 wrote to memory of 2068 2200 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cce4f2b2acfa122a13ba26fcb1548ef3.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2200 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b263185928cce091e45edb8e10c68694
SHA1ccf55159730868a6d1ad35d2028970bf82fb4616
SHA256d97fb85ec686c0b5b6b54b21f7ab5b5aefaec966ea44a1d39d13666812d5e1fd
SHA512ade3b469ad5b18ce96c3e527ccb38f622ab45f7301bb95199afe65ad1d1bd5e3d3cb88746b21c1b730d8e0943d3c05d1097c22f7f23f67a37b2359753bf80e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556a6882d5b158b46584e7f7d3e5a03ec
SHA15fc52937faeba931dd8118f216c211325ad1fdcc
SHA25658b523b171aff9ecde1d38078b9574facebf59cb3744379d3ebe56def9df7835
SHA512bd6ea99fd42a620c3be706861e2be9322d4a46f461a91825231d02ff5df141aa392fb723c072f9300e586d9922eed38d1fe7b3c3d8cde802d8413955d51523bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556d22ba37b7a487f7f21e0577ab86919
SHA1e8fe646d440f6e568fba4ba62c097ec65b51aac3
SHA25684ed68e2d22f3b00e1640bc468c54d024499c6895ff3d361866e15bd2ee77f84
SHA5125fa47d47db61b95b13d1e7f94ec54c7e4d3b28798d6d0076c2b3a4949d16dd089241821d42c15a9b4068a65822aff8c5bcca0a3af9324b9460f1b63ce2d31596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558b536893104109ea03cf5abaa02ccc5
SHA1cdebf45e66ae767ae86e5d4862b4580070871041
SHA256ef11d7321be6ded71510a4f867954297ac16e5b74325188a92dbdfdb086d0ed7
SHA512f3c489c885e454c834f2f14fed8403d00bd17135d6387d69aa9a50044059820b56f4738f525de104026d4f3a54f24aff4414d9ae5d7c21cfc5d46244540fb176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50451fa5e41e00021a19e5eaf610d24a3
SHA177f3191d465dcd66b70513db51dd04322026b79a
SHA2567ab784e97868a8ebacc97eb711bcf9f80076eb4674598de0d453af841e5e64b9
SHA512c2c68cca2d7c59e0f1c794a15d5d74617f6692ae45e6c0f0ea89773505859026782715c0366fcabd61d17cb334d7ce0c29b1e5e66711a78ee41473e910dec0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db74f5edef2c4b9e502dd3080f75223e
SHA1984ca946c798a0f6abbafba54b97fd837059affe
SHA256508503f2edea8936fe406c998427e12abebfe3df7e88170e1172c9ae5a957e58
SHA51261dc1c047a4b361cc25dae33792cb9c81196c510116de7f8c8ed341f8a5f753c6c324b5d8b4d9c177e9355cefae268990e2eb4a853eed113e5dccbff404b7bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52965afcce9fdf4dc9b3208620675fe22
SHA1c051f127c34009cdd6e0647b6f0690f83f9227de
SHA2569614429e9e1da7fb5c88c08d7f06b36f6dcc87f2dcebbb544a4d65d0120f1ce9
SHA512fc838a36647f21b8f125956f0be7918e93d11a1e2f116784f7b4834d2872e1feca6345b5a965fe967c40e2cf4d7d3f27e58e2c03dbcc81c76b89fccd85bd2a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505d5d78f0fae31b4137104d16dee8762
SHA1c2c8840ed9974d21f8eba4e6efba005c222a9512
SHA2560395bee5059b2141be5fd3b8d8af381809dc0bca9d365891d6b8207a582816c6
SHA512e64f1396034205117fd8270f28e504aa4d8bcce61549120a91aba3031994cc204e4f8a79e12d6ebadb1ffda1e16656adf8483c80b6c9193b1d9081e8fff2a6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c6524019088ae2075a02854f18cd692
SHA135a1b9a98afb696abfba65acd69567e20695d1fe
SHA256922d214c24299e4e45b131f0553b53e2bc6357cbf84cce062cf45c48a15e2fac
SHA512aaf48e48f4aa33d9e591463397ab2ff07577aa634bb068e54282f8344d6946f68231f6f7cda9cabc88dd56ef271cca3ee368e66cafe85eb062f03df27d9ea1e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e84ea68d337cf636ae8bf21f76f8fcc7
SHA1508bdb99551174ef752c629dfdb8af1481166242
SHA25625a8250fdc31b66944cb72e40e21d357553c787f162de6df3346921c818b3e26
SHA5128e36c042d076de0a77882a2fae44cf84b82c307cd17fd81fee67078522f03f1d1ced9032feee841f7cbcd7d9f86a7528cde20748c17e83d550d95bd3ca105a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549b84a8a79a2d82cbbfb64218be087c9
SHA125ce951ded7f8a2d8e84b18ba289d4969cc5d600
SHA256bda669eaafe83ca91fd87f1fc6906884949bf8815b8ebd9b7c079a52eb28f92d
SHA51226758581fbe80fcdd360ecf1cda0fd65423e0cc2784dd5c9549dfee2cbead2650189de280b640c5bc45ce275807387391729418d5deb043e7eb7ec845d470876
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd541e0b10477197c1b5fc1077900501
SHA1a22e1364d450994696009d43f91b9e0d8ce90515
SHA25687351a517c925ace89dd6f249915ab5060f5b5ffe28a22cfbbd3bd4fc63f7e08
SHA512f9e76c44ca1d3cb295b224052182de0b665299b71662f2bca26ea229d95c74551828473fc4fde0a65e1258c42d6885758a90bd9b5fd662ff689bb5b535995506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b93ce7b2faba20754e2ce305793e3fc3
SHA1313f3cf63c80977deca80b887ebeee196607c9bd
SHA256b0b7bd8e090b09d448865fc96ddb41577d6414ceb985a2ea8de0b56db786d2ff
SHA512cfd9c8f82bfa151410778081fc3204192e9e9ef09879ebbcbb255985fa38b583c2bd8d82d80572324dcb2ad08404fff88ad0fd0c2e162d67104357e21a2e63d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5655c9d61910332079b5aef4ded8027c8
SHA1a2695a00015b2f70917835f0d509ba819c0393f2
SHA256921b483fb680763f93e4795f202e4f993bab98c994f14c94822ac0b5dce5ce57
SHA5123d09e8e4f42b477f41dc728a86f7e792b8579d77f0c5a563e8e8eeef85f00eff87137c7659f93e1f7ca5528516741316c9893adf26705d1da06b59e3b6882afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c246ec4d73c343e9fe8d46ab0c30b09c
SHA17ba2f497ebdaae684a1cd78e913dd340fd87c4a6
SHA256b0bf0a3bced88691aa40050dfb25a54e64145d4c5b08dcfcdd13730a062f8647
SHA5120c4dd68585799d43895b2fc05e7b51a1641fb44d4787a17d6a172d82dee6577ced061f84a336835d40e52fdd6e2efae5d8d34935c693b4f9f3cec434637a08de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5028ddf131a2b5094577d3513e2a197a2
SHA1ac9d867031bdbae1188811da93ad30b075f2184d
SHA25619dcb2b9b67d1ea85a2c2dba187a8fb46e8396f21b8507a7429dc1caf9daa7ae
SHA5124fda97be0d53078ca9dde5be38dfacc7e115ed5f4cc7183eeab6a2a74266d0f9e11f0b37d3bda9fdc7456de7c2a3300db82bc5d3a806176da5b3cbbc0cb5aa8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae31e219c7f67e725bf91e85e18d74f0
SHA150535b5a3f3ca331011fdcaef25047fdabf88f30
SHA256f6b34aef180ab60b458c5902eb5d988f3e8435e0dfd9b9cdbb4125be0a43522b
SHA51256cb808c1262d5b6abbc9b082ee17d2bceff6b6ac0a556dd688abbceaf9cf580a766780d603e5512ef4504ca3c4adc8a78e5a5a2fdd4046fdaf76ecd77d74578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563c4c8f94ef3e89f9cb208edd9e539c7
SHA1be402802f1558e01db4dddfbcb7aa2dbc531440e
SHA2564281176e456d5875fd3301993ddd8894d0c617f9459c4502a719300649954a93
SHA512be71cc46cab51892cffad5e04fb05a0ca6944ab920cfaa43266bc3a19a5172147d31e0291ebf79e741682c2e3047f8d99d48305e7b79a1c2fe4f4438b677f68e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaa993cd34a2582fe901f4c6ff734bda
SHA1e2c78c79a25b6ac309e81e513ce9e1627af9d9c9
SHA256b485c4478be04d70595e6e4e9c76be67f62d84851cf27de7e4f4592fe89dd04d
SHA5128a6c350afe4780d455a9f7284d301a4993ca95c2e017abff7852ed537fae52453540a62d185250b1f2a066d335ccdcb98be2247e2788ed04cb32ade737ceaf85
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63