Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
d666fa0d8777e9483536ad11b8d72b32.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d666fa0d8777e9483536ad11b8d72b32.html
Resource
win10v2004-20240226-en
General
-
Target
d666fa0d8777e9483536ad11b8d72b32.html
-
Size
15KB
-
MD5
d666fa0d8777e9483536ad11b8d72b32
-
SHA1
f3c6a0d40caedcfeb4756f0d9885499f53cd8de4
-
SHA256
d461a466cdfc2603abe1fcfca6f09d2f856f3c5a3220d505e1c06f9003136a92
-
SHA512
39e7c64604d8720cd2c80b9986ed9118cd2518298c84137ab8b06890402be4f88bdc5464ac75f34d910d68dc72ff2081f4e1205d17bf68486ff1de897143e743
-
SSDEEP
384:bnKqMmiDwbKKiwYOcHwtOJjwxOhpKlFNjxq4ciDg0cLfz:TKZBk4w2KnCKDpcLfz
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009d182698a4727943a65bc6c9ecfd0fc50000000002000000000010660000000100002000000088379c309eb572a6d561e2a90009b25e9cd10e6f078b2f6727077aacab9e10a6000000000e80000000020000200000000d2555609f871b3e02c6404a43386428f8141118fbc7f77f46532e787248593a20000000115afbeb07007f68424448d3344b1dee139dfdd30254060c3a52d555282ae6ab40000000d69c68cd5cd6ad06890ed6d975f7cdfc97ddd2af68c8243135ab4ba7d8cae4e0482865d9fbbe5f400f35635507941a40248e710cc0596a36bb25c736c37e0a86 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38F00D61-E601-11EE-8119-4A4F109F65B0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d008c7140e7ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417022235" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 848 iexplore.exe 848 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 848 wrote to memory of 2152 848 iexplore.exe 28 PID 848 wrote to memory of 2152 848 iexplore.exe 28 PID 848 wrote to memory of 2152 848 iexplore.exe 28 PID 848 wrote to memory of 2152 848 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d666fa0d8777e9483536ad11b8d72b32.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:848 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511f885d96b343e3895f697335ab95f1c
SHA17685084601d5ff18531b986e2f59dd597a1b29f4
SHA256452c07af34fb6dcd80565e143703dcc90c90fca59ca09fbff660dc0d8c272657
SHA512bfc30a43fb287e375bc10450099d7d8b28182ca4c87036592a179790d7d859855405a5450f13a39d00235c172e7688a754de54d1927476566e441b37bbd403be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e2321140a938a233cfcbf032f7e081e
SHA101f8be0439b30e7f65146d34fbd9d6428c4f64f3
SHA256e1e1425df97309c4507c07d5d4473f705609191f26862840d3cdfae2752af8c7
SHA512e49082f1ca04d00a51cc7fc22672928928b7193919eb01695d427f033dfc3d7bdf5ac066254e0e19e3d5514ed678113669bdbebf3589eefdd71c281a1593893a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faee484c58dda38e0baad36f40fa5fe0
SHA16f87601cd3402741c23643dd4ae49c32f6ca7dee
SHA256e2efeee467a7871a50a0bb35ee837f4db7c46e7591147ad60e5b92b7cb796dc4
SHA512794804485655ec992b717c6d382982512bd1cc4c35f3712bd67f79e3afa243bdfbbe6412ee99f850cb46fd6562b30492f5c21480af43fc5e551fedfbce114658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b1f5352bb6ca051d76351fbecbec4ef
SHA12caf955cc04debb68dbbea2702a0ef49c411bb84
SHA2563b459a21dec8827d307f4f2323fb8bbb1e98adfceeb8881ede2f6a80bb0ace91
SHA5124db8891d5ff2da8c1cfa4c9b743a22e70e85f7ea9688a326369c3828f1dff8685caf6911b2b512c2192309d7c959bc942c00faf1d18efb7f953c9c67140f6ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501a58921b679ce2d054788488ff382e9
SHA133d9a4ac14a7104be54ecb96baee630820ffb26f
SHA256d4f2e709f959beb26b9b04dea126773ebf9fd878710a96de72e9059e62bc7848
SHA51278449b28ce708bd834c80e1623c534b3c1c037506c1ca54c2b78f14ac95f0cb5c3dffad2a6fa36294a94651d409d694030a4e8fc48ff75fc989de0d04aeb970c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a93eee6ed16bd873865ba181d40c370e
SHA1b2ccd585c4714a153e594311dca6b3e758c70228
SHA2566bb50de99ca75ef7cd3b04d9c605828e4cce0f88be7971c4282a36e9d917075d
SHA512b9a35f2ae2e87a4850e8ff9fc0ac400c22e9db39b0133bbc1e5a310d49031f1fa5634b9865aa42b3ed5e4d0a0fd2196d4544f605801b0ae8565f731c281411de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aff976709ddc75f4aa125068daf0a94
SHA183ce86411b7fc99b3ebe741f8cca8da5e4e4ac99
SHA2567ee5a69527e6a5c6bf42b226240e3e4f67ce0a74643d8692421623f74fdd2a9b
SHA512f7761cebda3f604be45f2534036550f46a8e50cb54182433442d5b370d8244b37c4f7676a1838148f558fb14ecbe76e53c2c0456c37d58e375b6b6cc82562dcb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63