Analysis
-
max time kernel
122s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240319-en
General
-
Target
.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417591967" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e000000000200000000001066000000010000200000004953f8410333bd7b2094820b6ba81a5af5c16f84b0fea8a6e2b1ffa0e32f0e6e000000000e80000000020000200000006b2b79336700fcc99944719d32b4054d8ee253c3a25e02608cb2ac87392b984720000000ba60ecc2197078a4a3203a9e75c9458233b237218f398f81abd69f55a2c3f647400000002866a8085d531bb4b9886c4a41f410fe28087a0d26a1fb3e5cb484fdbdfbb3eaa93cced3e0a64ec8d767e5d7d33748b26779dfc4d238c89436f360f4aabd0c3d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d047bb9e3c7fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9EE1631-EB2F-11EE-9183-CEEE273A2359} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2816 iexplore.exe 2816 iexplore.exe 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE 2460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2816 wrote to memory of 2460 2816 iexplore.exe IEXPLORE.EXE PID 2816 wrote to memory of 2460 2816 iexplore.exe IEXPLORE.EXE PID 2816 wrote to memory of 2460 2816 iexplore.exe IEXPLORE.EXE PID 2816 wrote to memory of 2460 2816 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5359b4b554afeb624e37c02218ccc0a3f
SHA132f4986163c0b0c0fded14fb278d3ffbc5f5d3f3
SHA256b3eb3f14e1c07adab886c432b43ec96780f1ceed43672249f03ed611cd2e8150
SHA51291e97d40460a511c042a2e5e7a65a05deeb2f775f3502922f65a4d35e2707fdce47d8c46e113258d918383c2a22f7fbcd04ff70f3fdd0b57ef787b8d51afcee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5d19af4e87a9b2e03aa9d082d9ec717
SHA1cb3e4fbd7ab8467844f7dfdf7c0aa621ac38ae99
SHA25674807c61893a48095dae7f3a37c2fa42b0152411cf7360262c4eb3807c282445
SHA5128ca77216d0df6c8e8518ae6a3888483f59ef80605cd6d67b6d4c16902725a63ff17ee4f59ee2293051dc318278ad7133ea1234b011e942779db50b5203e18def
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575e1cbebae2dadd645d15bc22ce7cb18
SHA121a7a7db0b5218bbb9eec4ba04b486047743b8c0
SHA256baefe4f544328b8bc01410f427a6a8eee2650284ef9bdecf4e10263aaaccb6b9
SHA512bfb675e0b53ea1b1c3bdabf81268d681ffe28b7d84ef1329c778ed06cdeb8a6dc819be3f6bbb4d9c8b476c6029bfd7086ae27ea753df077b8af66a853a8d082d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ed2c61a165f887d4d66889a289908b7
SHA188c7dd176428bb38eada8a3e0c82e711c8b342bd
SHA25695682aafe0d1601044c258da59cae71592e83d8283e3e9f21c1592ab5863834a
SHA5122d05a72f8c61716d42905e6309ff4c0ca298c649594814d39012c80579815048630a279cb7423efd3ab4eae782603c9876e9c47f5204b6c8636898f98e934e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5070e11792b70bed83be3ed6a22f22ebe
SHA12c3fdd72a9061358bae3175fdcc5d6c625d17aa4
SHA2565211acf9d8ca0d5e62b2240d57bd74bf6666a1a3cb9012dd91788c033067f0f1
SHA512a3e8de1b916f0e3034b61627d65c6199262396f2f75d327891d097f7f9c99be6bd7fe349847a8d516492eaa199643134ea926911ad088c86c730ea6f696d537e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd43016adc5c9176e2bc4ab9ebac8618
SHA1464ab64c12a2461bb2fbf19b58d2bbc8b97bd0be
SHA256d159a2d9abc54d346e89bb66ab6a053ea2292b3778684c74a714bdc075f08f2d
SHA5120885d7f6bd9223e394c90ec29c5edb32de82e8f9b07910c00cd8d55c3b40f36416414f71b1073ba22146ea506599538b99ad185bc78fb4d275447b147ceda934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57735b0f307034b4a86d21eba83788ae9
SHA174b2c49d8b28695ed2e39d17285340597e8bedbd
SHA256c0f07cab9cd5ab89b15b050d38324fb7513b8b03b6faec11e6ca211319d64672
SHA512c510b34dddad5bf215f567eda87c5a1a11ed69b6966e677c78ca4ea28eae0656152f6e0ef21796a1612972bddf2e0dcd8127feabac1a0d74d21e9b84adc30e20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edca470fff4d05a882519c9527ea96c8
SHA17ffb275cab265c052536ed3f488ebeeead84cae6
SHA25624c8392d937649963f9c78069233825b4ea535b0134d992c0e5fc0311adda5e2
SHA51271d6aeff62273470d7f4faca2ad1de66c1654be6e5b1fc67eef0090dc81a72ccf4c72ec70babcf84771ffb9acd426aca8c20f23db73a7cf0caba6ed8c194d0f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba7fce645a368aac325025190a930fc1
SHA112d2e690420858d9f35a90b8e9f8522099f8a369
SHA25660f1b57bd1f513a517dc8983b248e3014a7e4af880e183a5f9d70fc7a954f46e
SHA5126178f461c214152fa47c0ca4df0431667f2650d910db8369ae621ba4a110a8cd483f0912477bf48c9330a80412548539dbf49235b6d768485cda64c613f9ceb7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63