Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
ccd043b46585bda501738cae6fe5ada7.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ccd043b46585bda501738cae6fe5ada7.html
Resource
win10v2004-20240226-en
General
-
Target
ccd043b46585bda501738cae6fe5ada7.html
-
Size
852B
-
MD5
ccd043b46585bda501738cae6fe5ada7
-
SHA1
85ba15c48daee80a637e08cf51de69146fbc3057
-
SHA256
1fd38e255ab57f2ecf182a65b345449e10e2371df76aed90773b7d54e632433d
-
SHA512
9f52440852830e192afcf4d7b8c7a47f7144df9974f098f4ce5a2bc86835fa1b85a6b1f833ad6b065069ab2becffae67bde5821489861976e9eaae08b03113c3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000050ed05a6d86c949f04623a7fe70d48e9edbe243c3448ea7945cd6b8916dcdba0000000000e8000000002000020000000d108597780fba2a609c488931c6f07ece92401da1089dd2b3bf8b5ca65101dda20000000d7b151df9c8b78e7b09f8c423c23c782dc2a675236f820bfc077a405b0f6157e40000000c5ac49708ea5756a9937fb4dc4008ed5c561cc3a199874b06ce9f9093009b4944c113c3482601fdbe4adb8ad2e1a35333a7e0c6f21dc256057366c37d289c0f7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416715867" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F5E20991-E337-11EE-A6AA-4E798A8644E3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08082b94477da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1804 iexplore.exe 1804 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2856 1804 iexplore.exe 28 PID 1804 wrote to memory of 2856 1804 iexplore.exe 28 PID 1804 wrote to memory of 2856 1804 iexplore.exe 28 PID 1804 wrote to memory of 2856 1804 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ccd043b46585bda501738cae6fe5ada7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD53ed4fe3af17154ac11a22fbbe5548589
SHA10db36ac9a73c7629f5cdae714a9e2c803ba06b31
SHA2568728143ae4da7fe7cca4bb0f14704207762ae301228b71558201f4b013349e10
SHA512172e9ecbef58fbf1ee81b2c85dcee5411a0edd1bb425a161d8c02637691bba87ab74d155105353d1475d39993f551d86d73fa802248cc19843ae30f313307e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1fd6b9155e3eb01c576bbb334f14c45
SHA1587c7ed60e5c4589c6fd4af62c10af262b9becc1
SHA25643e2e07dc33a1dd883e5e0ad7babb7082521a04c19f0583fe99f8fa1288982b3
SHA51244ebc88cc9ee2ab50dc840d659e3281e7d4798a87227150c3c8e2aa7456705b44e87f12e10de87fcf02802f7014b3fe87283cd94b619afa87d94f4a4d592ba47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9c77df5a218756dde65e0e35f3390d6
SHA1a627c023b826aaf860035e7c029d2bed14510cd7
SHA25608b990e42d4cc5f472713e405825bc2f05483a595df559807519113da9bc6f1b
SHA5126ee51e939b1a9bd3bb922456e65a1a75c339f4e279718c9e1cfb4c0d63db5891dab75f209a00778ce06b91b9147b761b1201dd94afb509d2526bb0f61ea8b299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576da084dc6608812daff2ea8a5c707d4
SHA1c08283632c19077cde7087f49ad199e262f67d2d
SHA2564b0f4ab42339561ed9c6750d590fb7bb1b6305777a41eef35aa623ad84a3aac9
SHA512e8b19180faaebf33820114875f944e5467c4ca6ed17ac05cfd3966ff7d525ad8965cb4d8246355029048cbd14cb076ce6664821a823eb2bc3d56790dc6676d7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521c70403e3230ee84dd0eb1c53218453
SHA193e04e0be0da828ec3376f4d2283b2a5509c056f
SHA256274beb247bc4f5c0785712403eeeebf744bc51382b90e9a4ad219bc9bbd7f601
SHA51291be536e2dc5aeaf9c7b42b26ccde517f57b3877424afe4e11f47af07032ef7c65d7e356f517134659db4e6e297fa6ec4cdaaab210cdf8c401447e7d373e9947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b2ad2c8658c6ac890f3adcffc2c0818
SHA1cf060d26e72bb07bf38ae96fc918fb3add1f3809
SHA256ac4907b888c714e370c0700708cefaae86f1a4998b0c6253ef2ddc2239cb57ce
SHA512fa2beed6dfde1620782ae3d2f0cfd6324ede232804566e8e3184153fb6f937d895c7611c72f1385681223a76f061d0a449caf49ffa965c818e56df396b2b6a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5280ddd9d6fbb4314a21c8315e26d452e
SHA1b40530b702d4e6f022ce00c12a4de65f97d07cd6
SHA2566b6f42c0710b04ac145f1af72126f7a4d177110bacbee822f474b0282cf68919
SHA512438430fdf291ace792e79209c7ffbd959a87ca0676e7a5ca1f8bf91e3cebc41e32feb7525c9fcc67288a19e1d3c4f9035548ed253c26123c169c79a639562b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff1719f02ebde47f15d8fb382a3a2d4d
SHA102e20d4d2da85cf82250ab0db104caf3059a1dfd
SHA2569cb27883ac957d604e61924713dd7ad33abfae7c74cee2f0bfdd0ea01b1495ac
SHA512317a7099ddce6ae117e71cb046856d75117bf45dd659620f9bb25e402f59c2227050b9cdcec740719edd086702000a9e9041d276d1da88c5729e49cb3db4dbcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5005f0cc76fbbade44f49916abfb335dd
SHA1eb9f33bfc0ced3c7a3622a4d9ed4971b6f97b57e
SHA256084c7036be77464425b2ed1e6f2a4c0f6b43fd1fe8bfe1509b311677170426fe
SHA5126029655d252a377f2702aafc16b13165dd6969f5c28758c23f2d22cdd2f8a93c52aad65552969de160021df99dd75659e0467ca75b191d45937891bd61a8ffae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b273a60a725830483c7e7d9d230c8ce3
SHA140e5bacd62af185a04b8893b3c3c8e9032b998be
SHA25625e82d9eb80bf7906720e45c457bc32f494152280e2a71fcad31cdb45756633d
SHA5126c6adb41670d45f7b202d4c50e87e22af78f8edc3da98f45872b5fae408cf1dd13e7252a3f65f955783c797d2cd3874b59b86b112544201e8f904ba5496f04c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c8ca11019f93682d59b6283eafbcba3
SHA196142eff2904665fde7e4908938981aa718453bc
SHA2561325ec9a0be4a916643c79dc1641ebf6fbbeae5118436cc020a5a06e292a93f1
SHA5124f34bcf8f70a3565105262df3eb2f7e86372342ab2c555c5a24536593bab3edef75057332aec86877ef3ac3b895b17d5a30d6aff67c09b8fa42599430f3817b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f90285704ddecb3ea05de92141ea60d8
SHA1f4f553791598b457a53b0e39b5217cab2ddc9b40
SHA25630b4844adfe58642af2b5c2a0bc20ee61294d783a9fe2d869d61c472b3fd12dd
SHA51283d4ee4376ef2ccdcb4b83d066cda3a29d7f601950961a824b0424891162b9a3a98dfbffec3f528c87a6c017005df109c44f693fed80d9564fd348480b923743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5780ded34b4729ef899cf9e476b161804
SHA12f3d69ed9b6723297b8b4d3aa9a87a959659ccdb
SHA2560d3e34c5d8938743ee5601e2c90f18035de031957430958662c26d6f9d57af9d
SHA5120841d1d135f71b9515566f132effdbfd5dbb05d39b7315da091719e4eae28c117d6684e65a29d129365560fed483564315d686a955eae264e5127c0a633ea439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51279301f5688536698a1fd3bd6b462cd
SHA1c7f91d49932a349a91e4584cc63ef4ede1971449
SHA256c71516f2d10b8ad2ab42988c72cbca4bfc084e58de3ea2bf92fd8023fdd4846a
SHA512a52cabd9bef703520738215de8758b50b5049f1000190f62d70c33da63d409e5addc42ebd0b1c3bda90a2500eecd0e848ea58c57c38b504cc23c11b5162d8f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ac15b0d6c6d824205ac29ca9528b866
SHA12ccea4d05ecae0e71f8e18e8e15b07ce8e3752a4
SHA2561867990ec3a0c5d91909ac85c5104d9d240b5f8c7f3aa84655497b02f38e72e7
SHA512ef04df570f18686a05dff8009cc7d4266757c023c676be6eba8de61c8efcde83607081e15a250ffbc889bc9fd2c5b31cb64a62bc36813cff675bd55f0889f819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD574c05a41a21ca766e7a1b0f13244d29a
SHA14ca92c703dc238579bba1946f1cc40102d3b706b
SHA256158f53e1e9ac77f8ac6f5477d3e4fa58abc6617cecc62a005b73ff98dce0af80
SHA512623848a1458a5c714ea3e09c589baa7c8accb0b56dfe8154a6f93934e6b9679baa8a8166e6c21b2d48d5a672462bb26b1471328dca2cf34c462ed7a479109772
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63