Analysis
-
max time kernel
300s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 18:05
Static task
static1
Behavioral task
behavioral1
Sample
lightshot.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
lightshot.html
Resource
win10v2004-20240226-en
General
-
Target
lightshot.html
-
Size
110B
-
MD5
bdf1b0cb985164e30e61875d6fea2d26
-
SHA1
7e1000ed41fec1a06bce84c6ce0afc53ffcbb545
-
SHA256
698198475a6dadce34520e26d4d88811779ec5570b43a7c1532c2824a67d5587
-
SHA512
d115f809cbd4c33806e17b043d8b28b5bd28a248f9488da01ff2c1ee82bc60eccc02afcf2936eae245b5488298fd173bf7081dd037d2f5a206232964f852c628
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30838031a87fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E837801-EB9B-11EE-9782-6A55B5C6A64E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007823eddbcee3e149bc4db86b21295af600000000020000000000106600000001000020000000ce9515e3352d96f54095a2b41227453772cb5c9acb0127dbd347b433c0905e6d000000000e80000000020000200000003cc8193a8d1605977b8e1a15a816d46b2cf4f8aca97216ac93c2c8a7a89800fb20000000fcdca7356f16bb6fde96439b1c0005182aa03527811606c3b7ebade6ec65551d40000000e80d98f04586d5af58e098ea0381835febcf40284425033af68086a809b5549aedd1f6988077328a71a2b9e2f51731c67d0498f21b3d720c783ef5306e81c027 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417638207" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 840 iexplore.exe 840 iexplore.exe 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE 1316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 840 wrote to memory of 1316 840 iexplore.exe 28 PID 840 wrote to memory of 1316 840 iexplore.exe 28 PID 840 wrote to memory of 1316 840 iexplore.exe 28 PID 840 wrote to memory of 1316 840 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\lightshot.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a94e2f4e8a52472d3f98969d4e78feb4
SHA14c75983ea559a4c8d7badadad892e0e69ec3e233
SHA256a0ee5e81fac27ee395b84241cecb587595391ecbffa177264b9e8a20cad118d3
SHA512a6bb3ee248394200ab0264553744736ef3f32ef8d9f87a2c6ece7771d95728d55b24631b20f7ae696ac22f17bece0e7124746d3f36ab87e9cac2ae43bc4d23b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518c2c29aec295c840f713c934b24a860
SHA196afbdd88bf653944c73fb1eb2c36da3efe399bf
SHA2566823d97c86541302f4bc3f39ca9d7b531a2db5a4342327e001d82b5c6e727e00
SHA512fd79565ed8aac27fd0fb313c689916d00ce4268166fb3e963f56b9d0a5e161307bf4591500165dc91c0693be0a16c649e45aa2ed0266477d72f1f4371031f61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df962ddb5dbf29e2043260e6a7672d68
SHA1b8f23c88a66c9da63903c62e885d905d7de1b2ae
SHA2564832e8165716a4d8e404be848409a9dbb30ea0b0d84ea4d2f499f187dd10f93a
SHA5124e82d88eeeea9a3e392d519689c8ad1d5d3ec35a227e8e39bdc16d8f5c0e12797f17715de8238cdfa4f82cf7fc9b83f7020ee32259607a931a0b6772aceea507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c43057cdef037a7207a50985356e5fe
SHA11acb0fceb663af1c89676604908b586477e4bd62
SHA2567b9ccedffe2cf246daa2a14dc8a1b07e97fa491cee8f490598c2d9565f9de1b7
SHA512c8ea767922086b592482028724d848398410f6baafe2f4506eb01131ecf02745fcd081aac95c46351bd5bc1d88e30e3d52b738e408c036de24ca0d9221ba3c60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599a167b3e48cf8cfd40db91495b7439b
SHA14ada7fa5fcdeb630f59e243bfdd2a9d41ab4884b
SHA256d7d7b01a198920fe51faef21e5347752c24ff012af70871cf869ee4fd9d9d113
SHA512b0cfb932c890bbb3e52beea5857be71451c89cbe2854737ff241b04a07e6a29cc6f495f9eb4fbd4ab6f4a2018e29970577a17820e70fa17b92fd55703bdbcd88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddfbcd25f750b58ffbe3fc2c4f7c9c26
SHA1ccc5188e8e358e9309dc8084452ba3816875a57d
SHA2562cd44650021b25a27704a0b7334a9df92cc378bea0b66af7f2289bd31885c343
SHA512f3101a10fffe2d76482df8b5128ade01c8e74a607b5aad8ab75c45361e178aa92547b782244982d4500185866e0c89a5868d9d6dbd2484c7a2f8e880263fad14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549a93a585f75fa80a9a44aa434ec2bfc
SHA10425d9ba0ba03ab1960db3b82a4bdc7d2e05c256
SHA25695ca1b7be6421f03d18375a9ddf9c7e018ce74fc2e0500bc2dfee1f8666108ff
SHA5129c23c2467444c5172aaeb6fadf4c9efb613dede901a04f3ce38a6b53d235560f6206af0b0366fb502023ad128f148643f137c800941d904c07511719d316092d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD578b0b036df57e9a2cd7a2f646b53502a
SHA19b75d28200ff675eb36814d3ce918f8fd1d64319
SHA256e0987a4eb328e4497dfd4699d16c059143a01382c9d290dbe457a178247aed2e
SHA512f15dc866c6a5278ec949989268c0b6eec882bda01f120c60c865b0099f98166fd4d8df79901a50723d6c9dc4fb061fdcde6552a3fe06db7be169dd0481a4ca8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593d56083ce026cdd34a673dae27f9dea
SHA191c5054f609bc0d44ebfd952fed4c78411c2140d
SHA256d3c5bec015e338fbc7c58686f2bc4bb382c77bd33998bc0ac696a8b59e3c5c45
SHA512712327a9145ee181713f9cb1de9438022da5ab9016817136a056f5609f191c0a66c9775f92ad7ebd8491d8a33aebe9014d344ae24a105a045e00f7aa4b161642
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms
Filesize3KB
MD5f447f4e8f818dd22bbcd6322a0b8af01
SHA1ac54f20bbf253c5736497d39835e53482f54703e
SHA256902dd6dca26651e9f57e57148fd96bef808d74cd62f39d272d8a496d39d08330
SHA512e702c744a83891fbbb9748b0b7d22400d1a15aa708664b72241c32362ac91b300142c91d79abfc239fefb09f8e70a85ba3c382c5ddb1d6d2012d841efa669b36