Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02-04-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240226-en
General
-
Target
.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418190810" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0af32e9ae84da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14451D11-F0A2-11EE-87F2-6A83D32C515E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d94d2d3723739f48802cd6414eea5c7e00000000020000000000106600000001000020000000d823d34fc2b90fbdc74066892744adac0db1874d878042af5438277147690e14000000000e800000000200002000000031f72d64c0d401e46de57154467bda7bfd573d2f9ceb846e5540467b2b97764d200000005cbf8bf5404c33476376ac1937822db51e1b5bbbe4d886da4f1f943de25eacd940000000efb10776707c5ec2c6b057e618b1b846a086f36ae175cde44ecbfc2d9b857ee820912081a43041e09cdf8c2036c75cdd61600029290058476501ad142042bd95 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1692 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1692 iexplore.exe 1692 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 1692 iexplore.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1692 wrote to memory of 2508 1692 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 2508 1692 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 2508 1692 iexplore.exe IEXPLORE.EXE PID 1692 wrote to memory of 2508 1692 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca1d5fcb95b9035ead5d7284b4902d25
SHA13643673913c8c2d3ff3f0d61edd96afbf1172d57
SHA2566cd2ebd1d0a4988ce0c2ab056921dc7cc8488ebc283ca083401320fef2bb4022
SHA5123d9c306f867e198a859d07a4030fe590bc4c4d4aebb2ff38305797600f9d08b465eb6bd602fb85005d7c6601e600f65ad56e704a6e0049eb98ad51fbea4d1573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5ba8fc5833614adadf6f939479bb914
SHA1a517ef1295c4a84a244ff4f9bb5cdef1f13db69a
SHA2568771584f38bc233c08f3391607478d497d650bf7d21e7cd1a2f57b6e27c45be2
SHA5123168aa6ace9c278866a566f282bbdf69ee4231c09bef711b0d01ed2c6031722df7b6db22ef444f3ea7724d96cfafec113023a81f73ea2739269796ead07a596e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c70c9dfd0c9fce4021d44c8c69f31f22
SHA1d7fa1e0d164a9d537249cc8b33a3fd5588a440e6
SHA2564c10c8605dec63ca694f016c75a2f1740524399a121c91fc3625e61cfad9c6f1
SHA5129cd361a8d153e6128b8d0472deb017bc5b873ad97d33bc6a294fc5181af29dcdb26c138b519808bdcf488e7a2fcf39ef7a58842401d9edff77cc303b927a64a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5999b5141866cac0306a135d5502b9874
SHA11c7c09ecb3d1806620f6a2b417668d73b08b9cf1
SHA2561e89a07675fec84c7bcb8d12d21a08bd1ba340a4487c248f209b3c94dbb58445
SHA5126ee0ad14aae3d1b64d005d1e048921888eed0a452c56919812ea37d8c85d008b01a37c13c784065fe7f83a288527fa8d530936b81bc248aa851a58b1a1581a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594a946b756cb533e7e176fc590ec9de7
SHA171ac55dcb036c54b0a7a135c0e9e245df164fe40
SHA256824da070113e590838a6313b9cc991d99979984b1406ce4f82270ab5c8d31e2b
SHA512229bdf0fa89a78ec05b15aceb39c43906b68ce0c40c3614d4edd6529ac72312aa832a149b26ea849be8cb967febb9d826f68df287c048ef7354aea506cc25127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3bc4f0862c0d9ab6f5425ad6cd47944
SHA1b71b30214f9a4e93fbff15801c904596131192fc
SHA256795c16d4a5fbc8e666704423eb46dddfd72a0f6386d08eec6bc0d842324353e0
SHA5129a59a6263891c2e9514b6d48f52c011272ebdb45b6d31f63ad9c4e7d77e3d248aa72c67a0a23aecc4bde658e4d71fc2901646ed691c6c53bb004f79752c80033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526336e6537511f88934f86de453552d7
SHA1fefcda9ea8645992702428c697094fd037d82f5f
SHA256c2ba3a0370f530c3e69dfc2dfebe8a59df1c9731d648d973f6b47e76dc7605aa
SHA512aeda81e1f6721264a356b92454c6097ccec826ee1dc020be1c84382aaea7500f005136501209147cc2934338316cf25ad019ba770b270a48908f4da00035a010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52501febd674815c39e50db6258ad9a20
SHA1c9cd69c1a133aecb15c419904e9482944edf7de3
SHA256a7e24a3c091c57282e4f2f8ee0df0a297cade46b75a7a7b412f22cef9b3f130a
SHA512263230c5617b0cd11c138cc44e7205dfd545fba2b482d5210222a3a421d422535d3283ab5e5cb36ddf94d237c716741179c06aa6c1efe44cbed5ea2fa3866574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc07af6c5c558d146ae635e7b965caf3
SHA1bcf97de7990c250c9879b864f949e90d8d802395
SHA25643cb1cbe8a0cc06f064ff66f434af52dd2abfa66e344648e36b1c6e1fa3d1ea2
SHA51237fee2b1506985919d3439e90b398142f7bf7e06c74f0e78a3537f41e63dffb5463a2e1a1b4b200801cf5032f270068b37b13b7dc7386ed6ccbedca0bb8ff2be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572411ce5d9158d55a1aca1838ebe0d79
SHA1d4cacf4ee43b2e04f766e031b8ff81dbb6e3240a
SHA2561ca069d4a624711a77237839b95d9e46729913fb6479724248863a6f51334fd0
SHA512f7ea312cd595d6df60f77dbb81c5edaae924323f038ee778ff039b38509c0f57697dd5f97e24e74e0ab5b3d741988fd70c1812886ab5127dc6e6b7461e1de887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a2aefa9e228abb9f6e15d1d961f60de
SHA168521d00a05126b12b797bc520754d220c2eeb1a
SHA256132213507cdbecff5b82a4aa5dcef8ea6d6cf578bf26c4f976d9d74a3ac6bd14
SHA5122a7222650bf786c3cc108ab798c4cae156d68410f3cd9c2930c518f1ff44c64dc1dc09ba39990d5aa493e0d8e6e1051ddf83f624b0685afa1dcf3ed191a073d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD586b5604ad783c24d4c5ace546eddc5a1
SHA1bafd4f2524c4e3c1376b346aac57cb5103fcde78
SHA256be3b68147f624a773763e4c1b1ce29eba45040504ba89ab14c53f75c9661389e
SHA512f44b7cad67c9e112fc78c6d8ab24557355ab82001b94af3d4a2a3cccec34ef03ae87bee65e2c65ac41a1e0c882ef5ec8ba243b81fc41a56886cc0fb9261be35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dd0119e10b129836213050a5652f452
SHA1ec7d95af487c77bdcc43ae9629b62e71bf8b6f77
SHA256ebddfca9dbec93391f59fb7b259050df474bba72257ddffbb35d330909ccd6a9
SHA512ad7af1dde89c8a1a87ba1a12cb37b88aea2654d5c8225e19c38110be6961d1e80442accfea2d49cee2c84b2c27df9a9a1d31d18746b790ad56512ecb1866a234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572bc58459e8ee54ee6c4fdfe246ef44a
SHA1961b3c66102902216cc1f7156d50bdeccb711e86
SHA256750b935ed3b85eb5411c504e6f49ca6d0676464610be7bcfd0d370ca7019b711
SHA5128692f32a781949c5b04855dd2030c4f3dbad1433b3869eb3555c61ca1535624fa13c4740c4b2aa82e9aff075bbd70f5f9a7a067876c90356df375b7a31e541a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5850630bc8e41290a45f8bb3dbd571cd4
SHA16a5cefe3ed28e16e7301b4d85026b690e5107744
SHA25627fa4daaa853c6473b230f80444cc7dfbbdb36931540710ed74eb329f2923f4c
SHA5129e1c6bd95289d153bf8430622880534605d06dc3ceb478c11f289a6125aed432c67f060248ec5995a9acbbc64e6bced63cb7d95ed833514d450b890629eb3569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519ade833ea6c82eb2c00542ae6173283
SHA168df5cf7218dd05bd9e3a632099084206af82b22
SHA256430667735815a1539ad1a1c8906b62aa4ac4ad905181604e9cf0410e8dfe2f47
SHA5127b5ac7c5adb96d6e5990c0bc6b3cb41e332443c09e656c3aa83b4b4f32ba53570b984cf12fa394ceaa5b32c042f65875c88bed98d0b8afefc061be7e8e8bc77d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8bf7afed59ce8d388b4d266e8486fbd
SHA112e74871ddaa67c0bc3ebbf2be44456a221ade7d
SHA256e853cebaba9f6d9a2a7ceb09fa37de9d5413bf3a3c44bcff7f327cb90b0a38a7
SHA51265548b85b438cbfdda840001cf3770ce4379f4c6d3448fa22e28cd9d19fa350c0ebae22c726fe8e40507f6661beba904a30ad024b10d98ddbbd6e3c66ed118c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a7e64bb69deeaeb052b16dfcb9fd8cf
SHA179655d4a1283250ef7b2448dd95d45ec2c72ef82
SHA256ae0e60b3dae94a99147c46a6b2b99dc50bbec50e6e0f2a9c08fe1a357042f73d
SHA5120f3a36a6a3e5d8d28036b5dce63f69786390b14ce3d4ef28c9565fb4d43047be042a1105c0ee4f3ecab21ac992272d3160a36906268219102f0feea0bb449c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b5014f3b05f2fcbed6d1596ba921c9fb
SHA12885b22d0e37a5d410a725695b65706ba764b811
SHA256d280ea0d969a52af967ac36cd5f3901230e25686fa816b25e36ed64412a079ae
SHA5125b55e22bb97175124bdfa3f6d81386efa3c62cd17e0e814684ff223b4da94a9c0cc1490b70127cc74208a48b014b470bff8c3fd3c7e8c7298d17f22e39e96c5b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a