Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
e03c475f439f227d791b95ded5097a59.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e03c475f439f227d791b95ded5097a59.html
Resource
win10v2004-20240226-en
General
-
Target
e03c475f439f227d791b95ded5097a59.html
-
Size
24KB
-
MD5
e03c475f439f227d791b95ded5097a59
-
SHA1
20c8fbac18d8818a7d3d72208c94d5c9c2b0e03f
-
SHA256
7091ae90bd06728791f3d1bc1e7a120ac9cd0f06de94ccddc1a46ce2be15b7ed
-
SHA512
e4e861c99dd97c53e2fd826453f85a0ad148234cae2e329958fa82ca0d5ed0e6a23aeca826d3ac9a337dd1599af4ab70da48631fea916356617fb1c0116cf6a4
-
SSDEEP
384:FAry3fE56N5ED1pksnyCts9MAv4AGea2rlAeiv/e7y4GSbG5YvzIofQMz0jFlTMq:r30dXksyC+Bog72SevqglT7nFFgkn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53DBA301-EBBF-11EE-9A4D-7A846B3196C4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417653616" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90fe3e2dcc7fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000e73021381f9b557d9e317f041d34efb44c250377a51a2fa8c5742b1b396a1f32000000000e8000000002000020000000bcca23578792b658b348972ee2b6244ab454d08422c9bc12255a275f647da93520000000090d261bc3a36d45b48ee1d1295839dae0a651567d64910bd26185fb254411044000000084f54114e84d3b6b2f490ef2e502858d9b0fa02a690cd4a7e750b936f9e38e1c7e9eb960fd2b9eb903a2779f216a624b6df45a16f10dfb32361f13990440b85f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2956 2860 iexplore.exe 28 PID 2860 wrote to memory of 2956 2860 iexplore.exe 28 PID 2860 wrote to memory of 2956 2860 iexplore.exe 28 PID 2860 wrote to memory of 2956 2860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e03c475f439f227d791b95ded5097a59.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5029b0e0cde0815a84e07e215d0d715a9
SHA186d43c4bfe30dc43eb09e6ec63621c0f5a799dc7
SHA2567886a70ab74d54a1c937a1d06dcade6620526719da6c8ccd8ba00813e7b4770b
SHA512331e214a8f51b958ae9c263ba26a2555efce972867703304c4f2fff3e4002f679c6c75ca7d1a1f9a98800c119f36d112de634aab568ea4eafb6b87034b85f416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eea98af45f3a67eb5ff08b260d7ab801
SHA1ab9037cf4aa712c50430390585e6e6f3b9fc6dec
SHA2560fae6082881a058ec4551d842b0e82f977b793423626bc57cafad202d3bbea9b
SHA512ea26ae8da0f27702cf96269045985a8e56325fe939719b6aeca7e1c0b88bf9467ab19fb42b9c89171f255a3ccabbbfb64def18949ef0322e800370cb6bbd74c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e00af700524af7cd27af6b602eb5490
SHA1c1ce57e31d06cd3fff775a046e1785ecf8f97c34
SHA256fe8e87212b071d3fc330e8c072d1614c51595eec8bfe5ae60a4b33e70dc30bb9
SHA512b3bdb13df1f278bc6ba9daf1dd397e596906c1ae49b21dfe3982bc9361e59adda2805a49118484f2cd36ba206c4c5f8e6c6913bd5f96f336ca32a066060520e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaa19f3c43123f8b7738e4250b58c9e3
SHA17a57b72c7c2a68c45c46bc53ce190ba7aafa2f2e
SHA256559cf2b384c777250255ad9bb9901982d8833ed5ddb908ec26dbc04b52b80428
SHA51210300bc836ec0f263d6226384f98aa1a689e5034e5d5e8c0066bd23a888023e3a3de4a3e826bce87f7e4962505b75088f3a1b08ffcd1c0adcad6f8395649cfad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58daac1fadc2e5c663ff9689edac6db00
SHA120c26ed8eb27ebb87c9e95dc098415c00b49235f
SHA256e44e4622ce17bcb4256c3dd14a0c9f9ec201dcbeb2cecf79363877f53616d2fe
SHA512b24d3b3f323c6e5a1d2884a1a228aec4b85befbc8abdb8494b4275f519b6add86efb5fc594e3dffa46dde1e0b18f355f490454450d18f2a5c11f92dabb7fb10c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5021bcd4295e72836767b68fcbd832b04
SHA1523c94ee31758ad29515f685847a3b78607f7bad
SHA256640dd7e148c1c59ded313301b04215b895b5a10ddfc1f72af169e322630c68de
SHA5128941764123bbd22441abd98c14a454cbb1f065767133720ccac6c9e38e303dfafdad5841188808827726094097dff8eb6a1b6b7be08e1b4cc5323f9c84cf8c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e8f6e41ba86adadc489928e1b65259a
SHA1233b06d522fbd1bcf1c299285305a0a4fc1bb606
SHA256f89454b4ccb8f051e8a6f2e7595f0db7e97e2adfb49eee5b1b75873622ea5005
SHA5121651f9d3cdd0ff59fd29e01ed071465d153cf26a67623c04853226fb76dbd591ff0619f5ebda21f0c2f2dcc4221fe78740ee3e93ae2e42b61e9f80b835cb2ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55453a490d951a60229f66c12a0f112e5
SHA16a4e31d7521dd405fee65a0574020ec31ed015ba
SHA2569c462d7bef8d6b1c129af5a5d6fc25ebf8bb88fa376a7b93e1f3ff06ecc20251
SHA512eea238137b5516e8eb6457d5a707fd2327d083d936f574112b1d5945dc48474bed799259e23e76c9510a8ebfc10e491f07bb9f7172bcbc7462a4fafba91ffd9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a76351ad26eb9b16341c6ede73be9548
SHA1325381fd23f349d7085969ddf03561a565c5dfef
SHA256a699da5486edbbd6394e84c02ec95909e3001f2eabf22b73d47badb138fd8075
SHA512a397598d2e93bf8ef599d7254444352b48a4c4e6c2baf94d67e6bad3f11a172d7500ea0d034ae3e94085e606999df32dce628beca6bbc97ddbd5ca01e2df24a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b3507454a083c0b46b57951b702548f
SHA1bee5ab284e2eb810a5156e1c6c0a2717bfc65afc
SHA256747df8042ac1fa6caadfafdfbaa3c34534db5b04af5f6b66c9a2dd4cf2f76eb7
SHA512f7a309e9903793feb08b8e42c29ed47821f897107f0357d908812e401adcb61ea1a1ccbf5c326e87667187e7c57fba55a4a2c355e7a2aa639df51ae3b58670dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55be5c1ac6a4eeff196826cbf9ff378fd
SHA1afc2bcb20326b58a7799b2a10aecde8677273f24
SHA25682580793fdf379a0bfd2186b97d0646d4bcbf4046cf22d7e33ab2f929db14be5
SHA5128825fd1af7ff0bb01f604a06e429c0a99ec1a07951b84b7d6a3834184081ae4f3be91b0c26452050bca5cb7913619f9003cba28225e9cb5cbb3c2a3e2929aae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b5987d563617a5df87829a10a5ac2ee
SHA14f808a9b0db0e80009befe50e347c62273e79cdc
SHA2562e3448e0c8f01529ef9df7ce1c514d7fabf997265a4ac46033fd526bd0da84f0
SHA5122f6d9ac8494878f8f98915c1c0ec521dd1427a1f58c1d5ecd4984802b2ad85193a61e5652b00068bec17d6850a0d468e2d96051bee2ee16ed4261359d15a52cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab1cd19a4819202d9dde9a36290ccb32
SHA15f9915a121d06b4b375e3f5e74e691bff313737b
SHA2566cdb0c83be219ab89480becb18befd20cb70540a9235d7ad92af00e23e7eba16
SHA51267dacf2bf311e3f9eae3f978fcc9388e30a9fe51f613e44fe69c79689c6de70c1e1d7de32a1bd3b6eedb69a677997a9ac9571a0f0739e7f7119dd8998085aaee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bf2690a0be781a6850e7a2da05fe670
SHA1de9c65fe8dc84e7b526aefc94c6111fc2168c241
SHA2567104a69645ce911ccf14513bb1a6685f0dad113d690da27a4fd01f509d979672
SHA5120f6fd7838a58416bd7d57b6a88a588a06728cffdd9258cdaf45c91b27386e89b164563db3acfecdfbb1b2eb458c22b575b26c5956a940f78833afb40ad0fe60e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5777e78352f610a4f3aba9f2fbf8021a4
SHA120c7f5a1ff127f53970fc0f3fe93b91756572345
SHA2561d4562d10ac42ade099f5589ae9463fb7eda335c0575f4b19a8058ce9281ea0c
SHA512a1753e37dfa11f3772439b39422e3905b97bbddff76a322f007efdc2b788c6d35ca2245adfacb511c26a71f26b29647bbf76d7b0467fbb158eac2605423ad838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e830a20104cef341848e86998b80b20
SHA135ce5bcb76d3d1a4cc5706148562f8e9804cbebb
SHA2569447b99176816655f4543e1ca70c9a611240de84d1903f4ef18924122aa22342
SHA512295a76c1d750eb83ef190f30921499989e6f408da88eb67e79c3b0b4f8241bd8d0f8e98f7a826c3a7ed5423927fff48fd09babfbaffd8d18b31b7a5b7481029e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524694799e2fc5c9a6645294b8be27432
SHA15c7c48a27382aab4cd50fee0bc4804f5ea0d1a01
SHA2564ad5f926fefe74fe5a45d89ad31c9e41152ca469933b2b5a312f3a7bc3cb711f
SHA512e0519ca648687fe1e376d4b9e72fe1f5b7b7573df4131df5132374587f9cf3c5ed9aaef31d08db230595419c4c4b8e27b240761ee36648bb1b8636885dcf47ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58adf5398b8fcd7372e4a6f8da354f629
SHA1d181aad02a73555753bc6ce5f477ce9ac9f38141
SHA256268a76b44d84a824ff0eaaaaa86ce513ec6bea9669394d7b76ab4b345cdc7908
SHA51264ee4cca037870d0952f752b371bfa7f2d0ec51ebfdcb668dd57cec8adb7e0e77266ac950cd7f58c287aa459f403f19d178a7acd91753565883a1529f839de0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b22982bef53d83f39b7e4090b22bfbc5
SHA1fb12600589b471f7fab372a1bdf27421cb69556c
SHA256daf246a2758f43f4efa9a91f7f40ac137f408ba2f2f10f0c5b59c8d97145b026
SHA512ddceb3bb86bfff8323cb1920684945de890ab88a04f55cfae2eb72a35bfcd97a44f63f74fc82cd42dd9a2a9dacac2535730b579931d326cc97f26e83b4c0b4ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fdc2a802c47c7abba54357d4ab348d0
SHA1a16ce18a30b6c9cc2009b5040ecf30726c732a4f
SHA256958ebaaa2576f10b1175b6bd941e24c2a53347ea2cfba3bb2c00cf9661bea235
SHA512eece9695c232896c8e5563686d3a2a7236188b5ae453b6137ea81ea756435256fc7dbd7857caad110ed6e00d1e9a1599b652118091e8e31686b44406a5a55416
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a