Analysis
-
max time kernel
122s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-03-2024 08:41
Static task
static1
Behavioral task
behavioral1
Sample
debeeba787bbf6dce99054d14d802dd7.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
debeeba787bbf6dce99054d14d802dd7.html
Resource
win10v2004-20240226-en
General
-
Target
debeeba787bbf6dce99054d14d802dd7.html
-
Size
57KB
-
MD5
debeeba787bbf6dce99054d14d802dd7
-
SHA1
6948825c8c6b627bc30feafc3113e202c333ead9
-
SHA256
297996b7f8fbb591316a41d4126c02604d3cadf8ee1227d39352a714d3ccb3ae
-
SHA512
01bff00f09da5b888454d6ecb374e01a98e2342d888fe0feac6518bc574f972d74c09176dbcd3aa2dbfd77b70e5a3c14dc97e1f5d7158d4be91b256d9ee3d507
-
SSDEEP
1536:nIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZZWc:mZW9PYFVYU8W1aAZ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A800E1C1-EB4C-11EE-B671-4AE872E97954} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417604372" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000001981c11dc6ef51c9d8b9215b9a33eb8f091634394f3c3a2fce425f7a15b0abf2000000000e80000000020000200000005b5b831ac42a06d278e399b46d0e2ca2394145099a5c5d9cc137d13d3934f602200000007e9ef34c65702ec1346fba76bd7aaf45fb86d300c96894de77f1c4364ef4f21840000000fa9d696d231bbe97aaec4fed0ae8366f814bfff6f98c41f07046754eddb85fbb87ec7d36d8fcd9a44f6f41af12fe9a11918c627d14250363e65d5ef2f4a97297 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2003047e597fda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2612 iexplore.exe 2612 iexplore.exe 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE 2484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2484 2612 iexplore.exe 28 PID 2612 wrote to memory of 2484 2612 iexplore.exe 28 PID 2612 wrote to memory of 2484 2612 iexplore.exe 28 PID 2612 wrote to memory of 2484 2612 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\debeeba787bbf6dce99054d14d802dd7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5aaf4cfbd73efb00e4618a110358a1791
SHA1936cec034e7b37055fd59d40e2ec4317d3fdd88d
SHA2566e65bda928c7c924db8ef9c8c8994f6edc487ffba8208765f302ef177729cadd
SHA512f39fccb3f23b5d28606c9b2bbbf47928fbf03d377e986a934d623038e676a543d02c5fe23016377cc28841209553f48612eff0b03345156d7fcee53ee6c08c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bd88c766af90be462c63eb72f7c0cab
SHA1827c9935b4bb7912a9adf4696d6ad2c2df3fb568
SHA256a642db0cbbed6be5aab0e86d33ef2da62d87a7999e214a778087a889b46a479b
SHA51228d19aa0f0012881ddd880e392f0fce38da62d3018764b4698044b3bccb701d7e2e08b581d3332dfcb9e8453efe1c840bf0fb504272db9b853cfce0498542d1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568c8b5298259f75bdd4db9dd74411c7b
SHA1d4b1604700d6306deeb3f5602d2fe440d4ec84a3
SHA256e8e9cf9d8139a3a3a26f0c66cc06594d203a0ea5cc4e07105860932c4eaf9e7b
SHA5129ef4385089546679ae8c0f4855a90405b42cbfd2b3093c673ca3ba13560837049d3c4f249c0399e2b3b6b99fe413c48342c58e05cff63fc209316edae02f2709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d84dad6b0fadca71aff70e928e3c2ab1
SHA18022120e0be2542a782536f1d348eb710d30a2ff
SHA256d8d41784236eb2c6f40e62f256327a13443ffaa5cd2a268ef5aa87eec6f7a930
SHA512bb5cdb274a1034b7b4945642a0992d23c0fbb8a6bcf9b153f99abc0dcace35647f2c2f26154ec0c7832f404ff0a052fb21237be77c2dab6ddc06ad2a1ba8cc18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5894c065c57f4eb2609efb147a7c0bfd2
SHA1c01209f78954a3fd68e5ed304139a9444b534d72
SHA256227f2b46cf703ee1daa73207bef3c81d44357d5843427ff97dac75b0d3957b9a
SHA5125233ba0fae78aadf971c437d84cd30bb1afb3082deadd54e4bdc7eef776f38155dde5361d99c660284165eb158c446ff26c96b3590965ed199e69c9287f01491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56bb1120354f6d48f602ca5b2f9281974
SHA1bafcc239a1f915ae46e63043d8bf0ac4e53e61b1
SHA256fbe79ac353983cd6f48027d4882c522413e0b2ef20aa02538aa5b6e0d865af4e
SHA512dfb20a42779ebb63195a83f80820e1fabffbdc45d9eaa9ec5382b8f3cb329ad2e9dd76915d257026198f224345e669ed9666b753ec7ed393704e9dfced2c343a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c60391962d87260552fc238e29a2793c
SHA15104f1556270bb4382e73fbc069beeff074d24e5
SHA256abe1032ab03fe16c9c031f16bc4e3f774365d257a871176e3718910bc45ed95a
SHA51239536734947ffe124549fcd98a50d42c6fa384819e77c6d2cb2867457833cc04fe79c8b21ef209e653698364e0f86b2387be5d122d31587debeee5d773b5aa44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e9f3487c3cdaa507a7f6dc4211a0a52
SHA1827542396ba81c0c70a2cdd636457d35bb6ec891
SHA25621baa9a9443efa8bb0fe31bf153a2fd7d183913f63d6a1eb161c8df8b0cc7ba4
SHA5127377f79a1e0f3a5551067980932954c5a53e45284bfbf10960fa1761f454873a305a6ade49750ff13ddfe40a8b45a49a0db96eec9168396c0d97bd4e41ff007b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab55e431c1b949ed5252feca4de25258
SHA104655eb5947f7437be3f2c6a3d60b57a0781ff57
SHA2568d705701f08012e8b349034816f2a6781bc284813e39cd6b697ba5951e8a0f7c
SHA51206e7fea20c625ada0893b1b68811b5b88c1873de5161bfcc3d6dc34e18d5eb18851a976676884a9b8c0b6bbe774f93e6638cc6cf433e9869d16b031ec9729347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e21a8c6d2502d88a43fbfeb353b984f2
SHA1b283e6041c593b62bdefcfde8b409c860110b5ab
SHA256402e2a68b419ae232ffc4ca2524f66a0c9380ffa6b718569eb2cd8a270c765f0
SHA512f85bc7cfe433f89c2efdca1ab634b07cccf3c7c33b9b3028ba21973d214570e8179acaad7d0dd5ee150c46bceb786f95253aacd9dbfd1add1146b1f4cf7db29a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a322df7f60ed729850d69f13a112ac8
SHA161dc19db9656c7fc179a44604ed8c8f23483857c
SHA25683a5cf87d7a033a385d1e3639eaddc3b3cd8d4a76c7f921d16193271adfbf22b
SHA51264019d93a123b6c261a932f60fc5b11c226733d16f0bce82c863b8f0dba761007192337127635ded87ae4a17e5bba73cf4d7f23e5b2934c1abe8dc519a95bcb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ddffcffdb0a3bb75b92015b4b2b4057
SHA151012308593337c60f94deef6ba8c8add27eb95e
SHA2564b42b6e77ffadeca6750581db2cb11fc8a3b2ce3283a9318f53cc164aafb2c93
SHA5123091156408e77dc619b4af35228050e393747deb3d6f1a22c8c634ee51cb1e86b44b1a79e0ac21730657b70e92e9098df630b51a45a73fb386a21691f7f3b5d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b796fcd6385a0ea7ae85d6f6f547a164
SHA1e645ac4b0d30828edd76be19c53e3e862f64257f
SHA256049d84b4817a45b642dd4e77cce4cffffd82cf05febde08483b9abf5abc4db2a
SHA51246b404b20d6be26f118dc737dca97086e8edb31d9deb05a529c5bc228def5a8998262f321a3148d749a7c88e6e63d054582b8b1955871b9f3a38c3f44086d8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1542dfb199932c5a59cec2d52fe8139
SHA1e0dc1c250d463425625c994b6367e97b6e5957a5
SHA2563e89a8e50c08d18ad7131cd5e7174fca4234808869e9f31f02600357e167b157
SHA512ca41a42a59306b20ac931c23f204dc15b2e4bf9b53f8beaa8d5eea97f0e460001f7812035252812458406553cda2aa7d309a58462a7ad0f02806b5a0639cdb3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb059f1d98b65bea70b67dd24f58e43c
SHA1cdfcee87c968b328061a571f2ca00506d15672f8
SHA25645b8a32f0db821e090fea4848ebf46c21d68482dbefc9e83bae7abebf5b126b4
SHA512b0cdea6bf4693f3656695dc5f10a1cd4ac358b95318fb6da88944479ba5cba6c41573c0cc583299d36e0c633bb013a75ea6ea3b83767fb4499e7dff7bf7529b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5188471b4f187da882815f2f66cb99c6b
SHA1a6b80d208596dbac1f245b4807a255053355c7ca
SHA256635cd878b9e03d9fcccb52ec58d8d4cf4aea4b5769d01c9c398b7844579eb209
SHA5123cf297c6fb2bad5d52198f3b43c6609d54ede0abaaaf1abff256379d3e71918c53f5be592b143147f0500c6774ceb8e8cbdcb3ed5f02d68a7f8df013fa85d64b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63