Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-03-2024 23:35
Static task
static1
Behavioral task
behavioral1
Sample
d4a5d14c60f905c187730907e98e9188.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4a5d14c60f905c187730907e98e9188.html
Resource
win10v2004-20240226-en
General
-
Target
d4a5d14c60f905c187730907e98e9188.html
-
Size
2KB
-
MD5
d4a5d14c60f905c187730907e98e9188
-
SHA1
eaecc6bc54de4d9978b2f28ebba89afc76858f77
-
SHA256
66dee4797455c589bef4224fee7088b9b9f99e23e2d4b56df00a9ddbdac027f1
-
SHA512
fd5e25e1197c1bbef81f92f05429e258011d4d7e1b657fe48c7e62b10e507a3abde50ea7342507a247bd46f1667122e8e8921a00d4ca8075db45a8a6ab21e9c5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc500000000020000000000106600000001000020000000bb35639cd802b4d9ee4b1147672f98453cfc5948e767462f3e61679e1af2193e000000000e800000000200002000000092be3727b0c134cfe51101a8f806ef9f3e2a6252bdc3a59b2f4e0d9dc03a3ff820000000b739a394c53845865e643342f4735f69fb55980d2eef1dd6faa1168cdc21761340000000eadd4be3b35b22579d23bfd144cf75109596a3f7ea1c38beed8591cad81ad21ef7e5c192e2b388b64b669b8e0bbd1f84c60d03a440dacd3641412788faa6d854 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F7D00C1-E580-11EE-98C0-6EAD7206CC74} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00cb48048d79da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416966794" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2560 2848 iexplore.exe 28 PID 2848 wrote to memory of 2560 2848 iexplore.exe 28 PID 2848 wrote to memory of 2560 2848 iexplore.exe 28 PID 2848 wrote to memory of 2560 2848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4a5d14c60f905c187730907e98e9188.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e4c21c2a1d9522b97d8687dc7873703
SHA1112e449ab69688294b8a1d5dc0768e69c13c7cc5
SHA256a21186a2b5572c6f915df8453085bd970d4aa2a92bf0cb4bfbf83911ff5c6b63
SHA512cbd8566b6dde800866493e6e377891a90eeb94ee20bb76e01418c2e9fd750aa674a8dc0a8162f83e0a25b65e125ff9927b4daca34db06408f2c294af3d6b9b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b79ca82a28a077a95e53af9d7b44f358
SHA1798ebfc5bc4e19d6f4612103ec1f7c21c8086e54
SHA256dcb4bdcf6dd241f10d35a983a4138548f87da073760aeff21c7d5bfcecb7eedd
SHA512b3de6ad452217c3796d78b5ac752b1bf8b3537fd44f510b99724b3bd1998d846052139efd5588690ad5ea017bf47ff26133efb96874b6e7715c6f720ff65822c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8b33583c20c0610aa3cc03d93e3bb7e
SHA16afc0dde8fe97c8d81a28504b6dbec93d24d63d5
SHA2569490711a75ebc11d4b39fccd6044c25128dd27ab6372c561e8954bb42911057a
SHA512e17468fd35a73e2b01639530b2678f5f3d8305f95463a7c2047d57116b2a953523b8e0245210c82ad3b2f4d6f6cbc67fd71004467f69eba87a707b5e911a9b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c31f46d0ef185843770a2bf07ad0ce3
SHA1140ebb3c0cdd8f81a514e5bf9e38268f5c795ece
SHA2562189053b6fd0179ca42db3bc16ded235232eba176e13652080b6ce64c2105fc0
SHA512a7b55eed0ff5f1e3d5dc12f5f0280f40019a090cde7eed15d9e9e82a40490984c35f3e82e0f5d34ad48b5e374dab4ece54799dfca74f6d98b27b1ef006b5a253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1314f56bdf39d4108925b51d113f056
SHA12a4f1ad465210709c9c17c7cf4971a4b2b6baf86
SHA25663631268f55fd2eb1601e1eab4c880e9af4473709c9382b4f1dbadea9a6198a3
SHA512c46be37a232fdd05f24587c3c06578250a9aad3d6e36b797b756b3e1658e32f5322b2d2466a386c2e852b024351696c7ebd538990ab75c973ec4a86981f0ea7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfc4d2f6da92ba370038078fbd23cd62
SHA1f2ab44b64eb47d15b646e107bfcfe17bf749a3d5
SHA256abce9beccbcce6bc12e6df6c2a1999cbe853778dbae296dce9f7e813063a00fa
SHA51233ce05a6903868bb657147f291ef7f849eccfa4f974c2d0211dd07bcd1e6c29aa923bab7900b02a97102efd7141d9fc6dd8dccc5bff0ed363ca7941907f3a005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56440a839a78cb5523448532bc3ecb7c8
SHA1abbf603afd95cc21121453c16b072bc4cf87b559
SHA2563f361b13ec9c417c9162bd5992c703fdf9a4fa32e1d35a1aff333699573cfa0b
SHA512c0824cb488733ef07db54ecdd2a0853c4dcb2d53cec60ef02f96e951d3a99b7e0b3d2115626334e43bfacea905f69a16cdb2ad14ef2688f9b81b3441458da858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54844b4d7c2e321bb366bfcab3ffe6a4d
SHA1712de53d45969f8a8b394a87bcefbf51ac84d688
SHA25695832a493be86af506e78e1076fe65e22d6f418987cd83fa1b6924938c422947
SHA51277ecad527518640015f3c251f0a0ada07cdee0ca995161ce3e989dd3093957d89c2cf2efcb5e2f1f9cc59f81a84630f93a37024efcd6c8e321db1e00cdfb6c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcf22dbe83e69645952243516a764549
SHA18663450ff32d408ff6be39ef81d3d33bc038b975
SHA256e068e4e5afa674f3d9a769a173a4bc3463f16df50e0b15cd01d6223daa962c73
SHA512aa51c2f25fbc4c3f380d2889e3dc71b3d091cdd4326c167fb4e50a50a28cb0ccdf020f85699828e246067d27326795e28feeb2bc5c828802d6eafefeab249ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9cc32876a17d39377fe553178ae99ea
SHA1605f2575dbbefcc703e79bb305a41ec322cb921d
SHA25643298fe18ea9280587f2aa8375daf5a95f1b27a6c54099e0665dea67d29a5d55
SHA5121b26de588de1bac8490c9a49886dacd6937fa3f99a12122365bcb40bc771c78d132d8b3f54ee5c16246f34a4c6a78f09f23a646a735f7922875710ecb8ba44ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5316048a1a20d7918b301cc7c66137da8
SHA1856ad3e2fdbce78ccb27c0c111388e92841bfbd3
SHA2564e30b899421d73baaf746f359c64ee4f11e7a00137712da8050dd4183f677629
SHA512557e49054f39b92de147ef7fc951d0edc46ddf6c0f579beae2db4702b29f709373fd1d4d230d1bc4fb2062e09843052d389bb2acde850220281e12f443857e8b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63