Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
d50a7350d3aa44a3a0b277605f42cb71.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d50a7350d3aa44a3a0b277605f42cb71.html
Resource
win10v2004-20240226-en
General
-
Target
d50a7350d3aa44a3a0b277605f42cb71.html
-
Size
21KB
-
MD5
d50a7350d3aa44a3a0b277605f42cb71
-
SHA1
d6989e2d35a449d09de66df6d04a76078c66211d
-
SHA256
2a9b2bc3b6ad9b9999e359443c37d1e5830b35e9aaed5843c27a19a709d65831
-
SHA512
149e5ea7fb2f4b9969eb5cf335e287a1b4fef31bc8192c675b0cf513a5f05b488e6af2bbb5a59ed910edfe07da16697be55da1e3c719af44f921c755566215fa
-
SSDEEP
192:K+Gu3CXJ6Br5Whn5hg0Eq+4GoHBL61RHLnHg4yH44bmCI57pGQFxq5i+lNIl2A7M:K+G3Rnh76E9I5FmOSvPLMoT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50a9deafa979da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af6000000000200000000001066000000010000200000001fe954deba6eac3bf08ebeef948d16998a50a15a70507e416fee10aa3d2d6544000000000e8000000002000020000000944184474e5687d4878bdc1884e2b7a176bc101a7fe3ac6cd4d24d3c09a86e40200000006924e39729d6021b4a589edca0cea627abb80c88dec8df4d0ffccdef84eb9e0e400000004109f18e0c2424482185141ae5ec605d70a8dc52f962959629138138d1182d1f4a22dadd05704586bc799591672f786f7591254a0154e69ee255f823eb8ea57e iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA095E51-E59C-11EE-BB46-EA483E0BCDAF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "416979104" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 3024 2480 iexplore.exe 28 PID 2480 wrote to memory of 3024 2480 iexplore.exe 28 PID 2480 wrote to memory of 3024 2480 iexplore.exe 28 PID 2480 wrote to memory of 3024 2480 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d50a7350d3aa44a3a0b277605f42cb71.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a504132ad7666aa8902f3ee8c8a4b48
SHA1eeda0022aadbda8e5684f427a311a1a6d06fe392
SHA2566f942bfbd9d4ce5ee104d220dc0b6d86c840a3643093762f29932ec6095c7ac2
SHA5127625ea73e9a6ccd05a7c43fdd65ddbcade0a9e03aa20e499d454a04ed4e0b02332b308485e47beb573ec1f2ccdd9b28bc52daefa3ef6b1fba36f678ee9958ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e8cce1171dfb8084366a4497bfec4de
SHA17aad0149cfd45c3baf1a542d3eb3325f8d0ffd0e
SHA256b083ad8a6f2c959c4051a1632a7e6262be29806b36af377096c47210bb82be52
SHA5128918f3f1d187a0f8b16729f3c0b222f0147915713b37bc6a37150ab121b10a9b2b861aed85cf975ae8063c4c2ee6c3dae75102ad893aa971b7bd0cf7f1a186e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2ebcc533e038298ecc36c09b03ed734
SHA1727f18aaa2399cb537f093dd31bfb2d49d8891db
SHA25675a33f0ea82ef9d3690cb6f59b5421c9e68287cc42948ecc7f536857f651be8e
SHA512d677af45da4bb355ac4d115d60923f94c7c0d13329347c67e04aa595f5a1f263a44d85c380b693b6b9e784485a9e9e9edf559884c1b05e59c2b507c8f48a4403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9d48a0e29f1cb288a726ea51279a70c
SHA1f64655769a72b6c8ec55b2a00493206e89047987
SHA2568854552fc9bcf363b4bfc5a151085bdfc4098314e22cd04f366a95cdd13d1d9b
SHA512d7429b74b73d0313e0a8fba06fbf3de3df771ad78d5506fa23d4c226d0f1de882a4fd06a95c36c2c6a14686caebd69325595945e1022947c72e0cd1b452fb04b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5c5f86b217e13b1fe21fbe45a34458a
SHA1d407e2ca587b2cec6cbbd7ac76da48ecd976b433
SHA25647045994994d1aa6812a529e48e7c9faeca7ae08670728010ac5c211b7a4e88e
SHA512705488f50655b48703df9cbf4c4fb2e7cdaf8480d36e9f65b141b032794786dc00cd4dc1c2a629fc44bb43c459ece4d9645a1f4b13e1a7bb6adf8314437691a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520d6c2fd191046fe6eab1836be046085
SHA13562ab1e2186f991932fab813a8b139acfa43156
SHA256e2002c650be6a8f1dbdb9b1387186a4299caf0da8b7138c85bb38bb294d75991
SHA51216e9c9b5e7988ea8691ea98385cba926927b97d1c62cfb3e24802b2bac9cce4ebf8276dfa11d1c148a713c65a5b1ee8a0b40625da169909308d1b86ebcba9392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5114b9388bee41c591ff4ba6dee742b4d
SHA11fd6992c331f8047097ea1ff8f449da4510a03cb
SHA256504b0595387237b5f985fdcdd1e42fb0371d44b850a68ba5b1d181c23977610c
SHA5123c098fc0f27928f6b4df1e2ef24ad1aa6ea341fe8c9c703e6af2b088fd34a9797f53f793ae7b6e1a1b3cd15c89a559062719915220005d225a4db47063fdbc72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e44f9edfbbd730558dc715a4facab2f6
SHA1aa43b776b228f67c2a9438cdd365ffadf3358ecf
SHA2565cf126935b13a77c6b01481a6ceafe5bb587f9e1bd34a249904113936757b21f
SHA512971cf9385995c392cf71cc17e7a1d856285d6a6359ae8fd19783137436e15a0d9a3bf0e39d44c3e63eba82e81a7285f23cfab01c288bc02e1f2644e343054ded
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63