Analysis
-
max time kernel
119s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
e0e89c5c0c74ce9a437e8dab5f3feb31.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e0e89c5c0c74ce9a437e8dab5f3feb31.html
Resource
win10v2004-20240226-en
General
-
Target
e0e89c5c0c74ce9a437e8dab5f3feb31.html
-
Size
6KB
-
MD5
e0e89c5c0c74ce9a437e8dab5f3feb31
-
SHA1
907f10dc8544eb40d508bb126f81c75ac3d5b341
-
SHA256
e61deb879b8fe103b511df90b2eeb19c68a990e8dfc6102adf686eb89fdc6adf
-
SHA512
878af9bb6807fbbc8d1f078890138adbfc6a65d97a96945ac3ffe324c9a4d1f69c9585da50e40daa054d14e2602b387b8275824caaf572c9e6b8c0eb070cb1a4
-
SSDEEP
96:uzVs+ux74ULLY1k9o84d12ef7CSTUktMoRS0ocEZ7ru7f:csz74UAYS/vMoCb76f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E04B6721-EBFC-11EE-8059-CEEE273A2359} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "417680055" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c230677000000000200000000001066000000010000200000006bc0276c1511258a617a5d4ec859212b8354b884348483c51ae2c864931e8d76000000000e80000000020000200000007fbee0904262d68d195dd733f42e08cf83863ce71dc6be502c65b95b7c1f525520000000fd18bbd487987f5bc9f48f623e4958433ab82d326ce5e46cc9a70600c156245b400000003059010c55b3ad78b7ff9006e195d3e2e37048552d151dc5f523b5669a95066aa76df0ffb824f2ae1bfe6b860b8c112ccd2a9dc2a88197046b786c16c23920a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 700249b60980da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1696 iexplore.exe 1696 iexplore.exe 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE 1700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1700 1696 iexplore.exe 28 PID 1696 wrote to memory of 1700 1696 iexplore.exe 28 PID 1696 wrote to memory of 1700 1696 iexplore.exe 28 PID 1696 wrote to memory of 1700 1696 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0e89c5c0c74ce9a437e8dab5f3feb31.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5698f87c968801358a2aa6a47278579bb
SHA1af49e1b041f0cb8137500f6ae41568a4ccca6e9c
SHA256ec7089fc96230df6806f54da5a3654c22e0291a523f4b7bc21bb37547173193a
SHA51268a76ea819196a6b6d1e8ca4a804385b4532fa3d6d149b25763c560a83ebc342f477ab75f8a9913b475633ca6989a8f9a6b469ce9ad0f8d1c3721b9526aeecea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f461311fe2878a2f45f1a7ea1382cbcf
SHA11c5fc44136f064ea9062a429d8cc2c0971453ce8
SHA256f4546e454a0a35615544ed7a61fc225db4a85079df888c7dc34f12e02029c0f5
SHA512f20e63dbda85dd28def0cc1fa12a9b6c4bc931460e09394738951208fd5fb7bf309a3c75668d9cc9aa99bf70db681889dbd689347c1c26a6252e514299d6ac82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aae23cf4a915bdd16bf1c10d91936db1
SHA18e1abbc961e14f07d396ea45cd0860050df3b016
SHA256a3068fdea6a34bc8fbb7b5b9595471628c55ffd5c829355cd5d5910577b25ac5
SHA5122f0e026a4149c67cb9386d1da13de03ec872c5b7ac199c9868eae21db766134049c72bc4621690f50e6f65ffd9a833bf91f58db790124dfffac5241154d3637c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da51160603e70f963e61e05c01fdfeb6
SHA14148f5150c544dcef919352c981e4a407424d46e
SHA256812e95262e5fffdb3634de3edc74b12607dd08551b6f59a27f6576707c084ff7
SHA512dd454e9ba8c785d7b54850b7f6b3c333ace742963f8a523b6a902ac603fc8397e74daea4b53a68d156ef8ef95d9878da26f8d46b6d63a03f203459ba1caaae17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc13694e05b0c299ab12bd1ececb7145
SHA18fb8e2f2539116a039adc0c7765ab63390d5b736
SHA2563c7a5827d0d123c6d1e195728acf28727a4b8290ccd0728a967de65feed112cb
SHA5120e1035a2bbe0c6433d649b5dfb713f3548522beae93ad083a8c2a29c8146a5b586b49f7fde65dbe1c44aa296306f219bd62110ff9998863200958b7689b5649e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ad3ddf72884cb4903133826738f2ef3
SHA1438b2910516aa9b55902758fea51698c561bfdcb
SHA256b8b2d4a2ffa834503074f17b218de4b7a14c1d889d6058fc3e16b94ba458034c
SHA5121d0f7c555010409c219dd1b50e1c3b1c97fa21f59062b9db0774a399f1688e7a75bca9a5c96868b21297a5ff6cc4fd3c70d500de4bec12a0aa47e610fa4c7daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52716bf25fbddb28011def01fa01ea887
SHA15e0cdb5dcf2f7db0c617146465fa0335e1b007e9
SHA2562cd9dd0161e9771c39699efce543832d46a4a08938fd199d2a7041fd14f1ff47
SHA512334847a8d489c9c5d41aded278db7799c151dfb60ffcf693986b73afd9e184feb5b5a9ce7a2fdf03d8f58e42ef92e755d6459d0d28981ac437bf013d2b5b0082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598b3979503013582c354f1f2db0e8a5a
SHA172319bad7b53ca11a237bfff0bcc3f958e43c6a2
SHA256c237a17567c45e2a363cd5aa8ccf1358639cc21c269cdf10e5f64952334a74e1
SHA5126fed009710fd8327741fd6b22781a117c96a7549d2b4cfd94025821af25d65aa10b7f096d0e46f8343dfdca59d2264f2a5428201ad9ff1c1d4a38e99aacf3bbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c44ab3274935acc03b11d32caebc00d
SHA1bae0250df89112c561853bd0e1d1ed36c1637ae7
SHA256b9e4e96330d5c43f0f1c05ae2933dda5412025f00108d2b8ec8c07febec17cb6
SHA5127f0f951e9478dbd79a6d686ce1390fee6dbe590311f546a52cbbb801633772acfafce1ae947ed50271f38f187bc7f1c99505a74aba463e5d732fc7a6af359338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae615bd5a45da53eb0f07bd8c9f2554b
SHA17bc27a5444f14b77c79a6007a5c44e73cc873c37
SHA25675d0f6156fb158e0b80be3f00400a59bb24da17981076806bdde0c6dc01394c0
SHA512c2e224706672c663b5480399f0c00825a9b1155374024e6cdc330f706ed811ab6be0535b1f922208f833caa4585bd4371130bcdfd7aebc8e30c846145a7cc4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548401888c92b47a933cfdbdac865f24f
SHA1a4362daa12c90614bcd3002a3bed7ea0e11b793e
SHA25686a6d4664d38b0032354deb5f44eceb73d8b79aa79b8fbce4464d71a1439bd5f
SHA512a9079c8c797cdc576c93df4cfa07e749eb66ee2c5f84a572f0e0d9254233a7184bdee268da6ed28cc54753a5f3837bbce8450f437be660596c8da9c076afb7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54703a5c2927dd53e18dda3e605947fb9
SHA19ab7124e8bd12f7e81fbf70d220adcc80db9806d
SHA2565a610ea1fae45aefa984a138666d58de20ecebe73a33090e138ee9c6fff5d5d4
SHA512504445acc4de6aec2c4b023a1f42327b2f1de7fe7fb6d128a2516719e4714e7d60a28156ea8dad93bf2645b47c144e7302daa7e86801aec5208b7fd8af11425b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f828109647c9cd8f1a40a5ce8b1635a
SHA15710b49a735761ad9bd3078811007700347f23c3
SHA256e23cb5581bce7fa1dd410fa064febfd3f9bdbe3a90f9bc74bc0d4d27dc115683
SHA5125bfe174e3b43e7e4970aa41a5e6ecd502bc7c34e1a59c5d8926e405471152b2a74847cd2e2f041ef188b1ad90d958c13cb8e060c71600836ecae2e402b8b60fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59167b3c8cd186fee5a765058d43192fc
SHA1da1caf050569b9fecdb8c40c63f4cd9a20d22457
SHA2562907f5c3ebc99e63689b050134350ddb8ca65b71180ade9f2cc191082cf56cfd
SHA5123fee54c1c5059f6e68b80ed66262faf3d13b7a9a37919a990e4526619e08b4faafd8415e49275eb476a77be72fad05a8b10a3971d6432b20b2731085b8090b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598ddc550dcdc5efca4d8ff7bf4319b3c
SHA1af0e4943c43fb6ddfec727a916dfa6fabb77ce75
SHA2568dff2dd5160895c14fba34b0465e2e4dda12dcf3ebc428728a51bb4d9825fc00
SHA512375425f673b1c14e8f9f2913eb4e4ef22eee090a472032d769db34c14c41623528cf2477dbccd08d0bf5a1ade6d6d3284f931a1112a9f3920005d46ad03c9527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a425d6661bda8db15cd81aabec3562ce
SHA10544e322bd4364e6c4e916bef5f4e70ff966f60b
SHA2566863bf12e695d12c4952cbc20b1cdfa78734ace0650f2889a26c021e705a8a7a
SHA512373a54a40a243f920ec3418e7e767c030290e6cd2e5fcb929befa71b7e51eaad3d2c12b18f94e2945b4e2f71268ad74460e20769f1a537f65a1a240720baf840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59aa5c9493ef95e5693bf2a58316dcfce
SHA10e3501c21b497cf8cdc0ecdac7d0cb111de65808
SHA256d7a35e884157b239f3ef0a2910dea1dee3128a3d7b930962969d7746d0fd270d
SHA51206d9aacb0eb4b9de52bad7b5491e69ecc0eb1123d7be1212f102256804ca2f3d6f39d0b7ec045343af1d5094bc4440eabb7418c4133854f7a74ec0e316f1798e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5370332edfe7829245c572a214b4d73ae
SHA18e4421df511359aa64c6a4c695656f4071ebc29b
SHA256390ce4323d69091c178c89e222b0168297cb4a42a90aad4e0a116bf886690de0
SHA512f1258117eb9df9eee30b2af935539e92c8d72f39c9663deb2f0a60409d7dc9db471f61febd13074c3ceec5e200b833d981047e32c619c0ab5f4c51e1d7de659f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a