Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/03/2024, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
ce1d91a8b9592dd5b8d71eaf2dc6d0ff.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce1d91a8b9592dd5b8d71eaf2dc6d0ff.html
Resource
win10v2004-20240226-en
General
-
Target
ce1d91a8b9592dd5b8d71eaf2dc6d0ff.html
-
Size
1KB
-
MD5
ce1d91a8b9592dd5b8d71eaf2dc6d0ff
-
SHA1
f7ce17f02c174e67219b40576a10ddc9dc6bb48e
-
SHA256
26ce493921c14bc3c6c845a73332c55bb5f50e8a0e259e1e37deffecde451ce9
-
SHA512
8253922a2989fb893cc8f53eb9890e5e5dd1d2f4ee8428f2733960600bfb01119a8c628090720760e656880036f16328b3e32d26255c1032f2004eea73b52bd0
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416755675" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000ebdd1e981e74bab29ed037bfb06f9e6706e6a79bfd4a086cf7423ed8c5bdb862000000000e80000000020000200000007c91480dfd19374571872cdae4acdc0831c353801b7c3d614beb4b441d8f39a020000000cec7ea437a903709a9d52444f7b0c2436d5bf1d91a2fe905ac9d547424f84dc340000000006a6198f096160351d33fd13b3c23745d22286011d1292b40a6fe98fcee7f671c5caf54fc6412fbd9ea62d1d40fd408580f2a1e97391122188fea4adda88a34 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c029a468a177da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A384CB31-E394-11EE-87C3-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2300 iexplore.exe 2300 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1028 2300 iexplore.exe 28 PID 2300 wrote to memory of 1028 2300 iexplore.exe 28 PID 2300 wrote to memory of 1028 2300 iexplore.exe 28 PID 2300 wrote to memory of 1028 2300 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce1d91a8b9592dd5b8d71eaf2dc6d0ff.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf0ea85673406e3985f643f37ca2e8d2
SHA1bc537e7e6f98b275b9e84ca4088628da960b8fdd
SHA2565e438ed13aa92919eb1ce0db98899b6f4763f84ebcac73c481b568c13b88c462
SHA5125eededf03b99efbbfe85a2a08a7fa256c86377e97c284f21eaea552c6c3cbd1af1925a29ecc05fc775fa5235b86633bd544c8306ca2ab6c257d8837af47d9343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0f93e662d771d1fabedeb47f7450d3e
SHA19f9b47fc78441129402ac2056e4ae44635f3df0d
SHA256cb47da3f134b28ef669bb0573d8fcd5a06351540335486c6943e08c5ff78679c
SHA512c112d7c2fecde7144e0db59cda4473bc36cb006ba4c175dfab6d142e27d239e6d39b8f8e75e39ca247deff00291282e078405f72bc2a9200762c1122c3318343
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d19263431eacad39c042cf51f1b0fcef
SHA1121731aa512a53ca2a96f44f5d9bb8e1afe264a6
SHA25649a12c4897f0fc09abdc46dd65efc3d4037527d81771c73841c3914aa45f669e
SHA51277c863af39884784a857df024ace9f0ffec531cc2c82b865297e9a6c69b28503b2849d0740e8ad072271cb981774cfe10a67313f32b268a6123f35bf55a14652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe8654ea45b5bc2dd1a4815e91d011b6
SHA149b0986798507d83dd51569aebfd6511ebf5e272
SHA256417cfbeb4408eeec53743910e4a433089666fb2616b01dd654c059fa9c614b37
SHA5129476af1de4f4c520f2e048d8d69498da46d8bd0e928a33bec7de8ff56efb033ae68b6cfac984daf20cc8f92d2e84bf15028c4da63e2c7e8ca713a357df7839e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b99710d04c0d07bbb31ff7df74cc250
SHA1f17ba6ee5cf735f827a5d9c9bbb3cb6a9726a50b
SHA256e1e604a330ee054579d17e5eb36a7adf697c118c3bf842ec55efa64a2a793857
SHA5129fe2de1e38a6a79a9bd53874c31c7edbf2af9d5ac3c0e05fcfaf5cbca3e9ee631dd66fefce42bd399d2e7c8616c812d7c0d0f944e6cc5f176c1b897a31a4e891
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63