Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
d35b368b4c9c6874bd2ba84c2d41b370.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d35b368b4c9c6874bd2ba84c2d41b370.html
Resource
win10v2004-20240226-en
General
-
Target
d35b368b4c9c6874bd2ba84c2d41b370.html
-
Size
23KB
-
MD5
d35b368b4c9c6874bd2ba84c2d41b370
-
SHA1
9b5f6027303f3bb9469f2e3b1e999786d3e089ad
-
SHA256
ade522a86f7144592c6d17138f65b763f5d583de7b07ce6d3b7bdc158289ef49
-
SHA512
073ed18df3091dfde1cce601666c17e3bbca2ebf354454f39d7a40cf75a17d6ce5c25b2c64e85b7d28091dc13c7c88c3f541438915c316141e6f0d90e34405a9
-
SSDEEP
384:HnA4ywMC6podrNztvukeKXXTuFw9eXfcOMKL24UTpNyOcn8tvG5nTDuU5esT8a:H1yC1tWkekyCQvMKc7wV
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50551cd82479da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416922045" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a96069000000000200000000001066000000010000200000000c7dd4ee6df9afb9255859559eb34556d9d15c832750cb17eb90b83854010595000000000e800000000200002000000014bfb7a3c6cd4b29a2373f3d66ad896ecc4804e20416b0298d30c68a3009013320000000cbb0929a331042136c0a1396104bee1be42ca8c7b5a1eabea2ec92d1ff097edf40000000c9990e75733273936126936d01fff939325bcc8369861d5d27849346c8a85c63f52630a0740cd47c110c26a0b48d3d1d368bb91290503a1b5dbc7d9cb580baf7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{018CB331-E518-11EE-9F07-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 3032 3068 iexplore.exe 28 PID 3068 wrote to memory of 3032 3068 iexplore.exe 28 PID 3068 wrote to memory of 3032 3068 iexplore.exe 28 PID 3068 wrote to memory of 3032 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d35b368b4c9c6874bd2ba84c2d41b370.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567a443b9cb3c1e6983cef3cf63302d6c
SHA15e7821a089f4250cdcbc1be0d609478da3f67f13
SHA2569cdb308c4614ed215455247c1f9528581966b6151c569b3105ee6f3e6b4bef04
SHA512b061565a4f965916f8831f649c30b36a44993ff572b5263ea09577aca6efbeafc9f4809358b38dbfb85f8e8db9b1c00f56d025f75760b3834877681d8eb54675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569e7340a7543fa11f05c9fcf9a79bc75
SHA158267b54e2923cc7f17d252789a1c108ece574ef
SHA2563a634fbb4ebd02a70d318e16893abec8e72fdca24e0f54fe97cdf8ac0ec2d7fc
SHA5124d85bce50ae968df65897334e53b9a93e5e4f499f9f5f9b334fbaebe307240e92e518980c70c1a27752428f60297137381fbfc3c4e497165435d129995a14c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ec35b26c27b008ced20c6edfd75b8c0
SHA174b4804efa14c200a356bd93018d6aedc28c713d
SHA25659ca9d4cf0967c740f6518ef60c98f61e622e834f5a86df61b4bf2d6736ae5a6
SHA512a0097a27780019f63f865fe0d3c77c0b7ac63411379190b94ec1cf20dc8789d6ca0f74f4df458930e49eeb6bc75fbd00905808c3a5499e10aa115e26aebf33ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54edbff335679418e14ab5117a4d19334
SHA17d81b94005063386eaa61d808905cd66fd88a1be
SHA2560c530776e5019a20b66fd0dc39d1206bf6ba1ae7068685bcc8791a12639c5197
SHA5126cc965212374b5d8df0f49f55a0aba378d7b98c68a350b6bb208ce1b7f50a7293abbbe2bbbcc9e9278d2100dd47c1a38e1bbc874d69eb9350d40c51b5c5d11ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571a8bc70e347609e2297da29347db037
SHA1c785d15829f25013a489274295837edf42544b0e
SHA256c2229505f9e1560fa46e72fd2e663724f9fd223a3d957f86ade590417dcdebab
SHA512645f8a813ff94787570add7b41d862dddd090486da9220757e13d937ad0b71a1e0144b470a516cadae3bad480480e7b59072545f1145ef5821be5446730b2709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aeac955c06e64bb21e67cb4bcf2008d
SHA1e4a549612b97d25676d68741e1deb618dcb6d096
SHA256bda31aa3c538cd72aa1d73656c3f8394f50f46b9c7d8afbebfcdbaba499b563e
SHA51280782157bf04580267fb84ec4235064ab995018d0fbaf7dc14875e3bceeb4933ca69202af4cf9ad78df00afeb2bf372452f043eabdce444a85ab9d25ae1f5b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5437a9184a3076d3154d6549e37801570
SHA1ab3b44689cf98d6ef061d050c2b999fa6f0db384
SHA256322413a147a4135343698bb904e0c7ecf742e5780e1d89bf8834ab6935e1bbe5
SHA512766de2025ef3f2a39342e812963eaf3b325d01c8f3b3f2156a21bebef354d7d3d31769f9b7b3ad8111ce1d706302a76bad0ddae45091f5409755513f79b71d69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554f2e86ebb7c0a51eb799359fbc8f649
SHA11a640a942947a50f60eaf189ca7733f390e3e056
SHA2569cfa092065fbd77a01856fc457425055623d451f49f76bd442e900d08a1b5dea
SHA512fba6d5844780adc42a6c3231d9cb4d1c984de1768ab33ab45772cdef44a0d8a7632889116ac309f7b52add24ca5f59ce0bdf69d0bcb1d1d153d50d2e5a41cba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58146c03473869a2066719afd9dc2be80
SHA11f17868d8b7dcf1077534c9a8f81c135718c5d66
SHA256efa94526b936659361d527ae36f7ec4206c26d3ccd7d91c7e36962d886a96501
SHA512c97cbb9271bde38a1dc7c1d32b69f06ff005b251b8715914f5632f482b6af6c5d59dcf8defa270a0292781deb70d31976a4e4cb309593976a91a23497103b321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54522b0feb1b8043ca616e744ed918683
SHA1564fa7b1ff8d4d2ddee30187359116eb2e98ce76
SHA256d06dc2b7111ee4560dd05ce79e39e1843ce9ad083ff91c81c2267c5bdcdc6b8c
SHA5124f2045e2836b7c6b51e94859aea253508def6f3bc0cb6942b9ae897cc52d738d03218372e44be8e0fa4b5a1c0353f1a9501b15eca42a21f8b9ecaee948611b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577a7fe012b48b5e1fa7f9468f7943bd6
SHA151da298bb40dbe3dd948e3b1c7af4575c5f42937
SHA25620fa54507708d440628062a4fa201668618e64821d7a9ec28d87b1084b8374f0
SHA51273474ebe0c3caa37661e9629b1ef7ae50950612f9798b4b119cac286a66d7ac8b755ea9144109ff32102cfa8b253693e1337ea6fd8f928073f7ad40e0ea64b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed6fd3d7efa671e065f943ef9653545e
SHA19da54486658e3d3004cbf5604fd81528223d68b9
SHA256a0f8f213b508cdba10ec506c4bb1c4f091ce2b17ae009cd7ebd01f5cf0389b6c
SHA512e2c209a8a00632e1cad9392c99e73af93db7f76c9ecbc00b28c267036ef30689bd17a117aaeca748bce90c11d8903ae189a38a9babed6243a43cc2be565e53ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d88cd0908de9f6ddfeb3c484617b321d
SHA1e759f36f758a20d60ab7b43a209724f22a3078b7
SHA25631ce230c33c039a3613f0f1259434181af037a1b839f0b9f497bac48be9e91f2
SHA512fbc0c861632607a54c4639132a5f9485af9fc3985aefc892a37db84491ea8449b9e7a59a0d1fb66db4e65ba344997344b21d8e8127e063bf09c27e1b8b7423d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba4572af7aae3255e87e6411ca8b2b08
SHA13efadff875d28c7b7e8c075f46ca819efd0258f1
SHA2566ebb1a1b2554f43e2248b8572e0bc5e7ff88c270f96705ee841cb592c246bb5f
SHA512dbcc7a77ce3bb8faffde3bc003b36569147dbf345589edfffcc886ec11d853e4f46c7e0461576b5fd631e86600a703a2f0a6e15a27cd610b26316e50d72431ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55258a9786fc1680b6864c3653bfb7881
SHA1410da59a858adf17dc2e6b6996c5ba3d489fe949
SHA25617878417d795112590a123256d1bd9beaa837aea08d1941e84ac90ec20a7d9b2
SHA512530bafdc268bc6cb023e3a30a8e0c4e66d6f9cfd2ce247af4855ec383dea479976ff9722cc35113ca02bf43052659361ebe0653d762ea46ad88eee8196f174bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e2d571651e3346889bb5fee8e4fefe5
SHA1b1dd2c6f5fe340fd9dab1fc1e9878db24592c51a
SHA2566678a0c1613de56f98cb63cf07c279ced1d956236e53714efe3c87427ce63896
SHA512f26a19d03a975fb3afe73dec858fcedcb2e2ba8b0b5011f871859176195fd95a730b4d72e12fcd44b7519d7b53808ed7fd31608b9dd0c8805ec38dd43cef9946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ad2591008448a48c7160b1f995837d9
SHA18a59b0cf580e7ce6499f3b5a1558f16b1b079be4
SHA2568d20af6ecec5d744341a009210dd4264b1e80abeb6d3761c0283683f8491a047
SHA512aceb6bde472065322bb69afca726d9a3dc075999d7b0c87bd7b106f6909aef13dcdd19692c601abb32670e314aa91991562d3eec831d5103cd24d3207eb88a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d704981e9e4af42646260a9c8f3603f2
SHA1d3a62d83cc8ec5b7e22916756d8300c283f20a49
SHA25616c1664fb41f4e89241c85f70274ab06e0a8ab57c50770bead98b6118b88a52b
SHA512abdfe25bd4b7b6e1a2bb8655c3735cc5ee565ae5e32b8f8d2c1415c41cd36726531e5e1034f95d78395ddbfba512c1ca95ce268d9ee014a9cd11a209c0165467
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63