Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/03/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
d76a52b9ac96635a9bbde164530fdad6.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d76a52b9ac96635a9bbde164530fdad6.html
Resource
win10v2004-20240226-en
General
-
Target
d76a52b9ac96635a9bbde164530fdad6.html
-
Size
2KB
-
MD5
d76a52b9ac96635a9bbde164530fdad6
-
SHA1
7e81484d4e110f44094b91230c642a3eb5ed2932
-
SHA256
71927fc28122e124ee6d4730ee2a652e673d51f0b2ecee4b0284ed2e69a7b9cb
-
SHA512
49d7e81ce7b0977b7ed15ccfd802d2ad50412a6ad7159c3c846c5feeda434d7708ec676dc70fa16a581b7c8deb9b529f3247f480e84756914866230e8a906101
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000051b581295b132e129a1d1f6c405aa4d9e893fe8bb268df210404f219ad0574b8000000000e8000000002000020000000fc411c8d32c9876b5c0f9b74320f7b21bacd78e7586d06fd1cb829b90c4a64be200000005bc10a6d9df68e3774599ab8c55eec65bf4530730ba60ab352712629e408a8c640000000a0f094767cb7ea23fb69bc0b5e9b7f9faf4f6f3baa3e46f10ef2f0799da7b9ee35ec7dd8040661fecdafdab8cd32b05e7112dcae0e8e04ddf16a1ebb1f794383 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417055014" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9816CF31-E64D-11EE-8414-4A4F109F65B0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0001b96c5a7ada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 3012 3000 iexplore.exe 28 PID 3000 wrote to memory of 3012 3000 iexplore.exe 28 PID 3000 wrote to memory of 3012 3000 iexplore.exe 28 PID 3000 wrote to memory of 3012 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d76a52b9ac96635a9bbde164530fdad6.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59960130ee44241bcbf0116db09d43dcb
SHA1f060d5d1e6ac7e8b15be847471ccbc32da9e2d91
SHA256e278a77d52208b8b87e07c5073118b17c9900c6c1e1c312c1e89c28aea12b428
SHA512fdeb560e8ed636bcbbc80f5c9d3675056ba8828250d93034b98df3525eed2f56094dacf8a489018f841e7afbc8490f8d371da0347a14dfecc16ec4c4d55736b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5769e908648a27e8255df7b9fe2b61573
SHA13ac6c0848dfe786cc157694345c0b746ac9b7a7e
SHA256b9f3c6fb5fe599a01b656e29813c83e7864299f44682a52f75474ee2325ce664
SHA51223d8bb5e9a3d73261f1c2086fd027993be4fc39738efb013735e27a9f380d476f14f0c6cddae00841b758925843c7d368deddc1ddc4fe39c6685d75fa1db1ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51800ffeb22269c665204d08071e157ae
SHA1cdc8cc892b7f37ad43ebc192e1346848ae5fa36b
SHA2568ceefcce8a7af418a33c4b3f04bdc7e01c58706d1c7cde94429063258c605e46
SHA51260b128bffdd97522fbaefa3ee1c09a94814e7ef9a9a5990835bca6e7d4c119461ebdbc184b45cf26a035c497c4e6e25c06bec3078831bef2a80d04a11f22c35e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd8a50d87f5a90e88fa9f1c37b7cb384
SHA1e0619ed4d9839f22a86c6088704e0ab0b9cd1ce2
SHA2561e036a7022dddc865a80cf96642392877156f0f0f0cbe3ceabbab62e78a0a828
SHA5126bd8398b1e2ce52caf2ccf0230a68db426e8f9d64a28dc4fe41115e7cc8eb51b8aa545b9c03810a5749e2b1c2468d170875158e89cbff8ee50c5886128ae550d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52473d4a9481d9f49dd89b3d05a7d2a0d
SHA1a269849504cd9b0d9a0929baa5dd7cb83b3768a7
SHA256c775c39ab7d4d072684857aaec3d1fd1bbfee149b05ecb3c4b4ea94a9e3a7bc7
SHA51226b451023f849c8c342c4a00153f70c7a7299813d0bfa8ed68f9820419b48b9a8c18b3fc5fa9d3084eaf7e141b39cb0b389b624a63c86aaf8af1c4957ebcef6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597532d450d90db505c0b7cdda55de374
SHA16ac01201b51d71cacf660e38f7bdbee5885f5429
SHA2563f519647fa99a934ead7aa48f793da630b17a30f99555248ae144e8c8607a0da
SHA512a05f878a3a04dc12a3c34a8c57f4eb45984b0fef97ccd921315038a533a8ec1c2ed17cf4fb6b11146d54991298d5885ff9385822ff97981a21cce4696ec12fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1723f29a4464c50f1d91bb99700495c
SHA1aa96eb6cebbe3f71dd00804916cfdfeb51b747bc
SHA256da1d2b5daea7bfbc8d3e7d0cf81bb9de983a222bc407231c069100d69784bdd0
SHA512a1e751dc48dccca886f08cfb22e5114d79124ffbff34080872dc066157cfc64839d3f77090f55ea597bedee1c62c5762992cdfe1ba4c8e342cc3d6e8606f8151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e18cc83453c00e22b84c72a107dad5a
SHA126e825588cabdc481e9a8af88169caced04be703
SHA256870f43d814a0e74f92593087010cdd0332fc290a4a417a78ee5cdbc6ae96f280
SHA512f217ff1af0c7ff7c90a7b48ec6f89bdca349f3a72bf34885f7a794e8aace36a5085d9463142cf722265e84cf0576bf8049b3f07bc5dae4483bf2cf49e1d7a409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2060b976b6a7cc6c51dfd7e8bb1b034
SHA1dc24bfa9ebf3ed082948a23e27a58cb7d920107c
SHA2568f72efb5e57cbd03400d542413ea1179cb112d7c088fbd1e5c7eb6b55780aa88
SHA5129b28782b61547681b9147b5700c7648e9b6fe902538becc8fbf19adb2fbb6cff03c10a4381512e0eb1e47668cee843e86ef1a10e9e872c7e985ba5f6f62a71d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aad51a163ea2bd559d2ca242c5446f2
SHA1e235177cac6972e06fac55ff7880b0bd3e4ba030
SHA2568081a8eda5e41984b4adda1a98a94bd3fcf5a7cc065557be968927718f2ab7de
SHA51215fc76e7e5605860f17c4d23c5bc0f9b56eba62dae93dd3af59608dba5159f6214bd7e69778164dc78cd61b753c5f51a1e0f521dea22f0523b89b51172e61771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bee16cf44756ba8c97a91da34932a0c
SHA16f60ad4e7c06626b284208ca52f1f60efbad56a2
SHA256f2ac97a5f84a179df5184a68b660f4364e3e728a004bb923128a0ec592b01325
SHA512eef72acbac4d82583edfbc7ede281a02fe3df90f505470401a0e1665e393112cfd8ef96ad771c867830070def0b0c1b0a4d9e3001fa9b06474b1cbc0781cffcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc03096a816554c0c0fdf56d8518924d
SHA104fccfdf541c9792d28f2dcde98df94d12e877b2
SHA25692b110c029b2854d8f0afc4733bed1b842ff498074a8ce88934ba395a488c811
SHA512e58325521b3f8d4232d0453896ac4f2c6572b5c8b86a53a594726e13e023a7640c0fbeb1d468eccd8f0b14b0912f6905732a489845cd6d0371aadb0c3f949e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4ad446db223b5299e2960ed25ea82d2
SHA1877923af9a4096111d5941778f49e1903b7d5909
SHA25691d9f9f00a351c5fd33eb6a1c98993818d9c24ebde004cdab00f92e537574da1
SHA51253ced13976c38b65c5722803a0fff0fe5601e1c66a6f79967411eb472dd53831d1674c351cfdf96a67e2f93887cea3fb9a861eebe20911cd1d107cb10fb7d9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50bb953ea29ad96f386d453aa1d83a1ba
SHA1a2ddada73a9d1a60b70e3bec126da69df103e76d
SHA256baa46958b1524a96a3356940d938bf70e12ad22de92bcee579c7fcbb3d469411
SHA512580ca4b148f8edfa77598667945f911a9f9729cfa2f5b5f858da57b7cb10f69732154f162a92f27203be50f3584aee6638ae410c675e38f456aef18d9c001ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eca06dbe8dd8a9c9074ea7a32e0a0b10
SHA1c435c67051581ea1b3c77bf2a33de4fee413d732
SHA2565743e1c9c04c502202e644bb65b6b3c1780950c130a800efb9ca90fb99be15d5
SHA5128c24f41857246d69893bab20e99e893482894626933c91ffb0e6581bdd5d874e3197e7bd1048aed18267fa7e397e598328baa5f8efab7528504287fc57f9daae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5b44d60f79b991e442d526f737e6f40
SHA13048e91dfe7e911f92899d6ed15a76b435a0be8a
SHA256ab76db70eef54efd43a9c9375d3b7a3b4b06443171392035f563b531a9ddb8b2
SHA5128c80466e1b8d2af269ec3a872d3202db13137b437c07f3ad50928ca84b6716189abd2e44b2c2d5f8964498c95cdbc394d417769464c5f79cf6bed955d7b29238
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576a9c8c68a62ddf08d5b75fbf0b95da2
SHA1649b91a04d2667bc86f6ea212bb2f6296388242b
SHA256964b69a8eee8d169f91d887a8ba2c03153fa9ac75724d9fb729006a7600e79e6
SHA51210b2fbe9eda8f9582588c994f23e6c78f97effa2bd8cb98a160a8af37e90aeefa7b12e83de9e005585afc8953b53b680c62b88fa7d45a95ebe37efa275d1ec17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e313de7fe03372ae94516f2fb8d17f7e
SHA185b0ac936a9bc10ed92cac89029e07eb8dd79272
SHA2569cbf1a6afa85e7cecaedbd309ba873529d71ba3be13a541dfcf8b0b1babb7183
SHA51217aa9576fa7ceb155998363181571be11122142c48928486bedd9dc32fbdfc5bf9fdad02a502e1e1415fd181ab8ac6f02dc0c68ae453150b2f9587f5c4db9501
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63