Analysis
-
max time kernel
120s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
df5edc48e4f439c932d515df777071bc.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df5edc48e4f439c932d515df777071bc.html
Resource
win10v2004-20240226-en
General
-
Target
df5edc48e4f439c932d515df777071bc.html
-
Size
203KB
-
MD5
df5edc48e4f439c932d515df777071bc
-
SHA1
f622466316eacee94d1d52fef90f6ddebf928743
-
SHA256
8aacad108fda284037471d72cfc9bc35a89412b93819d85e159b688e0f61a90f
-
SHA512
39a5205c51ad7117a8e4ef14526d521ec6fe64d82df06b76cbe31008bf466905b4d8b4d1fac555902a2fd82bfb722ae95bc7ce30a3093eab287a47c2a1aa96ac
-
SSDEEP
3072:X9Gs7eApBtoewUwHLGViwfVF4ZDhYUsezN3Z:X5PpBkR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0f76ba4887fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417624621" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ffebb09deeb747419e902f1accea58f700000000020000000000106600000001000020000000d6ae005a567c33904c75582cd5b235ddba395aec141ff1a5d59f291a770667e1000000000e8000000002000020000000afc0fb33cf26cf017a58a4aa2ce95cf549164135b66095fcf768997c2611344d200000000ed7cb68b3a4a2395e813433d5ba0739512c8505c565e55c01af3a655799317340000000963c513627547dbf3a004b966937d774c5e31c6d8960dee328f28ea5596d8d4e8da4e7363758475a716c1cb1cb5146bb7146f2d91a7e0a54e58a635d0bc12d5d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CED92491-EB7B-11EE-8C39-CAFA5A0A62FD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3060 3020 iexplore.exe 28 PID 3020 wrote to memory of 3060 3020 iexplore.exe 28 PID 3020 wrote to memory of 3060 3020 iexplore.exe 28 PID 3020 wrote to memory of 3060 3020 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df5edc48e4f439c932d515df777071bc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD560ff11fde88c9e1b211d6772bcdd7737
SHA1101a24028c8f9d2d5992e68667fe2355b0367edc
SHA256a98fb7f006856d16342022f9c65b78f844ff9e6ca2a7eb04f4b7e840f0f1db20
SHA512be724459aeb96a074bfdc681a030de65c74f94b8e3624adfe4dc549d7709869f3b17c05e196e029d7a413a8608dfe4f6d47c65e8f4615056f302c3a414915477
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52b5d457701ec9ff6ffc1b54d6832eaf4
SHA1e025741dcb4744dc2d30faa3dbb671d8a1694e78
SHA256e3b3ec8f3fc48c9b8d3fded6062baac7bb01501d2358aadc2337422588005db7
SHA5127f0f44b8169bd4e09665d09b2bc959c81faed648475b98e2f5005f8ba21b23c63bf824822e507e2306d40176c1ffafe104cc9a5c9775cc74437a71c6ec5852ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a2475ad3d59f6e26fcb86c59c317fb0
SHA1c86c56d1588eeebc78a06ff656d252d271f5ba1a
SHA256417217fd3912f7e3f3a95b73b6e366203d8758857975cef0391c932c41de2eb7
SHA512bdff3726d0856b4e20d6b1efd7d591ccf94ca69709bac300389aa08e428aac8d14969bca3661d87663c00f529f66ff6c2c8e6075b5b2b0440632c3f8e8efff0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c545e2c0ec07127c9b6fb020503ee42a
SHA1b7b4c412d63ea62ad244def2ae7585b068afc179
SHA256edc5cc7fd98097c7cc51920c973816fd4ad95cda9531a7ec4deb1ca389b58452
SHA51227fe69dee33f23913544f4d766d6972f403b5dc3c0557f1ceb1de4d14f705a9b1dfe84fe3a736983cbfeb82ba2c92228ce9a5771f902fdb9e379bc79d62c2d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e224dda4e664f7dc6e9ea88cd75a0cab
SHA11fafab3ae535c32f1ff46e0f3e0c279e274a93c2
SHA25673e5cc7d19067d790ceafea5bcb1a12c40370a1cc9fe3a5c63f9561250e9ca6a
SHA51248067ef36bcce28fe9945530a36e052d074f594d5091af5289f908c5823cae1ec0eea7206399759b8a5e4ab6462c7d4575cab9ed2124728cded6d2d23badd157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e7305e4fda4cd16e8eab31f2ac90b6f
SHA13a2528d7d00310cf8940f5dbd49a8b946388f4e6
SHA2566631b1e07f74c1fbc616503fd0c9693089ff2ee1de75f12eda36450e17f295a6
SHA512eafb12a3a36cdde6261cdae9d22674553174d62d59e5a154fa9b6552f6894e7ebf22778fa4ce6f8f112465705034673c5bc0060fcf4bbd8c65df586d6c75ad8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577a052c26a41b0f1e14eb18ab3bab6b1
SHA10b8936545155e6aa129b5675620cfc74d489308e
SHA25634c9650fddb90d35c00fb43f04d0584f57e48cfc688e88fcb2d50783eeb25702
SHA5122716ed2b6f656fd7a469eafcc0b216fa6449a61c27b8ce64786f9066a24bb6ca217f97acbc984b24b9442ed40f4d553d19d0676c18e831c8586a023618e81098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da5273d7dd2272a2db82f831293e7754
SHA1ccb91d1617e8ec2a2ec4d16dd053106bc9f3c27f
SHA2567ba7c20c66ff13aaf42ee7f123173cfd8d9f5d6589683203da9dc1ebfe49af11
SHA51261b41d35646ab9e83f7ce4f760772abb1a47a15e1be52137941edfb0f0b65d8d5af696d60fc25745a2b2f344b3f49e9c9bcd418c5b448fd0580325e7ac636ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b97efcd94628f98742cc663df8b98a15
SHA127d64ade26e3312e95c04dc95c15bd72964b166e
SHA2567499a410a0ad09d49e94ef9fb1f51be1e5497737ca80ea5d0ba2313392c1a926
SHA512cd3becb8491a4338bd0bc88f3c0e042a7c95493e4871fedaf3fadd81582fcac02cdae6d765bd72b6d115f05eee362ab3779b306969420d33d5d7a8b7dd0b0a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b33356d6573cc0b5e533c0a8a20d68b
SHA1f0671758939db1ede25b62acd69cb0fe117391b1
SHA2560e3bbcbdf4d8b7baa7bd1fc244e7c1edad6b6dfdff1f8ce521bb2cba151bd014
SHA51291b2d75bcef8cc725cbb2bd59367160ff203b49c4f9fdecccd87c698c4a4d5178da49c3e45c74f3ad763530b20b329e49a1ed9e8a51c1e53e43b2361290472db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5005d6898255c7e21f76662c459babd75
SHA1c204f4509f0c5e2a8afab5d5e73edcfceb79853a
SHA256ae932febe37fcc2a7e3f9446db025752e44ddb4cc6b1f2661e753bdc9a605066
SHA512379f6ef56035edb29c46aa7eaaeb21f515fe89a8c27991a195e6a79b8a52d9823e2d44cf7ef3706d9809597eab42234b19c8c593ac54f6caa31ea71f1e8bad4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521df1d5a5bf8323e6f27f2fcdb30411d
SHA1ab1019aded728b176491a3b1feeb65b3c5d9f238
SHA2564e7ca039cfc1cec4d20c47c6a315654e16fa6af6e322af73fb93333240ba4072
SHA512d66ea46474cb5b47bcc7d0da3d6c8f7d628a4d3911d96b991fa36e278a77917eb046d283e2e212c546bca6e9d6dfc360c79ac76c4025610700a2cd8e9d60f018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad95a247c3af3d5fce0cbbd68a69259f
SHA171ff1bd87cb662ce8e98f81e311b37246ed75a9b
SHA2560cf4fce4e50179dd7f0301029cfc85a83341a93382fb3eca0e3cafe92eafe3e0
SHA512578c75de1a7a7a9b08d3ca1533bc0d9400f66e24bb59a16cda88867fd984d5f7172441bcd0b1d919946ca2033113a3e2c71f58c281e5771acb904aaf18736bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1eb72aa623755e834c7549bda57d585
SHA191b6a2df9197ac5b33ae68d01fea2f4dee704eb0
SHA256cf2f9613dd30120ec98e410952ce031b5b51e43b4dda139aa959416111be061d
SHA51264bd6181b14b025c510589d80b4da8822ece13ea30415443dbb66b83a043dae66fe806270ab3c939740e48ee3460c57b6c9bcc2ac8ecf75a72b14aec7e177f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58a63ea9fe5b99380d85ba76ecf34ed99
SHA17f019caf3ccdd4e056148c0c727aa0dea19ef718
SHA2560ff7367e09bcd7a726d3b4eca9c045b0698cb64fe5067437a38e1be106052f3e
SHA512d6527e4e81b32f796da8eee1a2d11dc71f1db61778d01e675e69a9cda2c8d39476a8960d9cd08adc09c7dce04f97ad10fddda0b8029ca58af6a6788193ae4587
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63