Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
d3dcff602d1de954c805bd99b515c439.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3dcff602d1de954c805bd99b515c439.html
Resource
win10v2004-20240226-en
General
-
Target
d3dcff602d1de954c805bd99b515c439.html
-
Size
33KB
-
MD5
d3dcff602d1de954c805bd99b515c439
-
SHA1
e576df909114f0cad7cff9f366d6c8ec847082cf
-
SHA256
dadc22c91ef289447793385d64fe8dc02d8e421f00dd420efefcafe5036ac876
-
SHA512
f8f317f5462c93fe2cb9b475a1c3dc068886c8b7098bb4308fe00f5d80c84b0ebd73cc2a745ee4295a53c5588464847e8be9481f47eb64017dd0e2a98d49d3f4
-
SSDEEP
384:S2VwzA0LbukBSt8RLrdUWi3Hlam0jpt/XUIIr3fnzjtqJ3E4iE2Mv1xvuId:S2VuStSzW90P/Kr3fzEiEH1xvv
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ADCC0EB1-E53C-11EE-B98D-4AE872E97954} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c23067700000000020000000000106600000001000020000000bd07c8a221a4d154c7c06aa941c3d92ea6cfe1d0d3eef5953c56e740ac6b10fd000000000e8000000002000020000000297979542004da6091fe03bc07b2cf26d6b90b0fbba9c93fa01b3d4c4b5995a620000000e7ef122928cf6e041f44c791d1428f2610891b123226a8162b14e4d12d9b433940000000ee4c2f9e956db43db12e2517e67a3310e40fbef4d6fac466745c0e01c9eebb46031d8c8a5d3781e78f8b39f9f10a24ffdc1b5e319f7ba3fd68e1d487ecf42cf2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d02a9ec24979da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c23067700000000020000000000106600000001000020000000fea4ff19bd82e153372698c383df66bcf0411f2bc0482297393e5306662e46d0000000000e80000000020000200000004fe84fd68371ff9eae69ee94483eaaa15f270dd57680d399e1d37977abcc59d4900000002e05528b5e4206a9b1bea76c8155fdc6a7b027ab995b7910e72fd1d8df4923a67ba910b9602bd5df7d6bdf62ccc94f9063f6d8ca1872b157dbb3ef45dfeb46ebc2cbeaf05c01f850a47cd560a1d8da14dc9fcbc5a033c48cf1f75db4ef9b2cb1f65e841e93e0d1c146421b43b6d3136c8fd7ca42ac71c9378f6d5733542e4de9ecc33156e0dc3c4199973c2a414cc32140000000b3513084866e0c710b0ec405866bab569d570d08ee2084ca4ff184f3786d7e77af06668807c617cb055dff44f42e5ac8da71842c86e341faba29e8aceab375b8 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416937797" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2628 2240 iexplore.exe 28 PID 2240 wrote to memory of 2628 2240 iexplore.exe 28 PID 2240 wrote to memory of 2628 2240 iexplore.exe 28 PID 2240 wrote to memory of 2628 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3dcff602d1de954c805bd99b515c439.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
Filesize2KB
MD5e99ca6d3f2b999574338f84194003ad6
SHA1624c65b9bcddaab23aebcbb00869f5ceb779f958
SHA256d6cbe9e6a337fa316b8be42a31ffbb4be4f893477cbd5ae9691ac0fb0fc02c9b
SHA51247fc64951c6a25056abc6d12176e322913bdec52927f8b46f288991e2507d1ce2ad28c9a5cecc299670c2891d5f794327a412fc3f6ee883fee7d8fc7ae58fa75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD563a2f53b217f6103dca734bc880373dd
SHA124ee50711cdabc160ed025c2d5718c8a187fd48c
SHA2568a00f7c357e7795dae9254bd836c75108611833abab6898670971b15f1524113
SHA512bf753bfb25196cd3dd361cadc88fb22fbd86f753b2a2d4168d75790a6fe2710285b066723a9277b5f9d764d218b815cad55532e93a338490efb037383eba25e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a1d5aaa7c266a8fdfa3726ded0a658d
SHA15b2e06f43939c279b2287f5fcfba8a623145dd28
SHA256dc3cd420bb2d9e7293aa2f5559bdf6ecd3f92ac0bd2ee7ab66ec7cfc5418302a
SHA512fee14429f6555a185c64d0a5b7aeeb8eaa8167f58d1cf1d5e61bbccb5ad1eb57b663e2efcff61f7ef3d548471ed778747ac0ce3c0afa233f7fc5046051bbbb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5657757ac2e3cd1eec7e441fea724696c
SHA133e24f6be4ccca848555980960863badbd149c64
SHA25675e536b404cd2d050ad0d67dbeeb4acba082ade03282cd6a6777bec984121c47
SHA5126f2f68d7baefa664e3092a0cd34dd4f237a24fc42c68572ab66c867f31ddd696d422a9752c5b3608eab9d6758f12c1583097886a6709de84fb4a528820ab0efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539c981b6345329ad6e8cf1daddd6c512
SHA14528bec0d1ac209f73b2ac9e4b28d5830f572b8e
SHA256e0739c3f98779f7f72baae1a35b41394cd7c9e2f0da96c61b3c0879e769e033d
SHA512b2e5bfbc195296e6cf60e2e374928c3e4a665fa3b5311b9d729568e899c98a83f4fdf115668b0e1e82a04e13e5348c243898aa33057f67f33cb73d14945e3dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587102f13f4a177d4bee8a19555b47717
SHA1ed254fd82d0d0b5ac6a66df36bfceb3ee6f3a699
SHA256e770cfb0076de3a2cc31f722583f34731429b2b3d142d19b82419bb2d3dae009
SHA512d83c9c7755f7206ab0567bdf0d14513823fb99caa5b0b1d184b6f189c2380ef46138a3750a72213e3f82d4977ed35f1739caafb00a0dd44042e192032ae46833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5337d5d95c8a99049b5ea5aaa408acc3d
SHA108428030c38a8dd3689dc922d64bc5dbf2c2156b
SHA2561f9c560a54374254bdaa10632fdbf274a503bc92b2d6778a4f91655671246e5a
SHA512895ecc722db26db452f5159de77546c1d83e767078ab368a17a65f521bbd92ca3ab6d965a64c4c8e90c52db9938b581c62cc375bad1501a3f407a163cc215737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dbaf8d2c8f4091142a8d162a3476791
SHA143d624a326fe9b54cfcab03d287199be9fb20443
SHA2560795aa96f5b92e21afb10f9f356583605eb9373e2c593f34be0521c27426e82d
SHA512817e97dd9598e7f296c4ac725338cbf6d09900cd068bda9c807c2d456564f0eb0c16f7837cbe4b0d2145446d8aae5057775b7a96811ff078d91f1cd359274699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573fbf54f39264f0814051f1a0d041a14
SHA1c11db2d61e15dcf1b83018f13fdafc3d8be2aaa8
SHA256a78b649b1ef6df40e91b70ac57685b7533eeed52b5897d659ea484615091ebe9
SHA512b8b089a524982d248831a2653c0e0eb7c3c7f546f57c83e4a8aa4ffd51cfa152d1671ab2017ad84e830029b87ed55b80b75e696f6df549cb07fee2375c967384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554718601ccd997c2e3ddd92cf9474c2a
SHA11ec999a5e42f9cf93537e3eebe320990fa8cae15
SHA2566ea284c430dc65051efb0e80cbe16949deefee541589722b0a0bcf7437a47075
SHA5120729eb55fdc5a27d897bd95c02129825a69a12bdeebf81a8bff641947c95b612ad75e38015ac505dbca7c012a64aa13b820dfd31331141b72ff2c4f63533fd8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a98a782a1ef2b6f3f3e141adeaad51b
SHA16ae613dae425b2f2647403a2c81522b0e0701fd2
SHA2561458fee016a9ce7eb26cbdc4772b8729d62ce368c648285d7baa5f4a2178d9b5
SHA512e16264119da073bdb0f4e32f168999c14f88664086d7912ed4bd80c51863dfb4237229bb4e3f2b3e58ca8521ebfae29db84f9b65bcce420331820ad8e3976e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52943f0efea97f180d06dddc92cf3144f
SHA165f036883839ef8d8950795adb3e99a28695f5d9
SHA256354c21e2520777d017a447a29e3569f643fb053f448de3213e1285cdc15d3f9b
SHA5126f959e24efd34a6eb4318711f5b62734943e26b17f8e5466a34b1e55469b1dc217c07b9f6aeef872a8fcbf5ad910c4ca1927c0ffdb8319d68fd5adc2f00222b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b84c1a1678f9958d565faea2c2b3fef
SHA158b8665320d58d5a4413b30f8ab6500976b88a2b
SHA256a30803589b61b785ac305b351a54f2f72d78e66cbdeb5d359d5c79ef99791eed
SHA51200569837c827a652d02019a6056b767cdad2b17b35079ac8d0c02bbdc9cad14a8227de300afd33d4292e134ee42119d55b55920a1eee0b5625717052abe17882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5516aa5feea40d3b01cf983c1faaca22d
SHA10833e9026a998ba3dabcce7626a9230064eaa196
SHA256b821781e474985c7a3e97654ef2868e40365f4b7059e1bae1878443fd194da52
SHA512f7b4a8b0104b860b8b3d7c2760dadcd633d18095e61e53c671ebc2159b298a299ab6cb90b5dc1485bd41812982079365fe6eb88c9720166c4d6f35be420ec633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5086ca96c76cb9796e0a0a2033530cd54
SHA14126b78a66cce54771ac3ef6fa16c7c46390daf1
SHA256642e399c3b19b39e5b2ceb00ac1e658fe81aaff51a69ffa574874257e36f1002
SHA51207aa12d0aa0b7ee50a1e501b8d6df0e410617e2bd6ced92268ff749d1ca664ed203ab12acc935dffd93bc46cbfbb425007ba50dac89a1d6251c222e82b70443f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e7e74a013b4bff0ded779acb34fd534
SHA1a8de661f88ee7d29a585257428671c3e30487d44
SHA2566b1b5a086a08f846bd567cb54f621a4dd89485adbec9d37be3b84f2d2b13410d
SHA512e146a8ec8a4c2b0a8d7e8617997ffe342ad64366df344d7429d03017f7ce17a90dff4111c00c826524b697d686bf1cb360559838e0cf8f8a288bb39ce65ac320
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63