Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
6791024.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6791024.html
Resource
win10v2004-20240412-en
General
-
Target
6791024.html
-
Size
32KB
-
MD5
8ac55566bcb8ac4264bdf0c97c0bdd95
-
SHA1
63270e8a44ebbd476f8278c20583e3c5105c2b7c
-
SHA256
f2c3e283186921d9a93207ee1e255ebdc49ab5208d5ff0ff8f955a232ed4a536
-
SHA512
45f2df52d2f55146588a3c35bd268015042c15599c90f0c6afcd7c1d20bc35ad358b5eaedfbf7ef7ba04fe4e3798c77b4c99f89ac34068a7beb859fab54c2eab
-
SSDEEP
768:gIXZFXZ9EycL4bJqVYROdXLtTaPAlYz8bEqks8k:3XZFXZdcL49qVYA1RmY4ev3
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c23067700000000020000000000106600000001000020000000c3e811560f9c20c3e4e6971fbdba8fee437d146e0ef404cb18044e220b6e1e6b000000000e8000000002000020000000f64c8d806680c47c46374f9269cbc76a4908e2d144b73dd97c570ac4dd5d8a5e2000000030351e5d486711d7107d13d661c654be29a6cf92f6f8be68080fed1ac3b5da4f40000000c4435959016246911e13789a63aab5ed867db2b20e7b6255f532ec5a2027c56318a250b5255a3516dafb3d4d6fafa602ecf888f1a2408964cbea2c2b355dc2a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38E98BD1-FB4F-11EE-B54B-6E6327E9C5D7} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70529cfc5b8fda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419364685" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1048 iexplore.exe 1048 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2988 1048 iexplore.exe 28 PID 1048 wrote to memory of 2988 1048 iexplore.exe 28 PID 1048 wrote to memory of 2988 1048 iexplore.exe 28 PID 1048 wrote to memory of 2988 1048 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6791024.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1048 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5a3aadf91348185b5ae640ef8519131
SHA1926f4640119873abbe765cf5fdeca1152ce4d563
SHA256d0b73cd497ea8965a38704a539970f9284707e17a1b8b660aff33e9c4c2433d0
SHA5129da3f374a08306bdb86edf5c7e98d952cf2c52c334d723ba0a3475cfeae9cab4a7df532974f4a6702e5ac25cbdc7ca4bb6edd474aabdd4e5f12545923a06559e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2d224d213eb5d1b9a0a58ca49f6fab7
SHA11f71e6e9b2accaaacbef12c30155e72eb1b348c7
SHA256a0a08c4e3e510e458b94ae53f04fe50fbf1c37d206dddfd1379174e2b2bd3772
SHA5128bdf26f1eb06663ce2f9a63a267e57963990bc295f9b393ea3701ca342435e69f799e62ea2525f1b312a52adaf1c821d9e204443b9f425c3687f30b97f06bb31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a704a9efe36fc0022716a7d96f20c75
SHA13a7b724e391b3a8dc24b7b90065d44f8319b89fb
SHA2560612ac3e87318f637787edc3deb93e176a7487bf69b0b0a185313e86fa7a69da
SHA512475870ca978ad6f0c1c42427fdd8443668f87546ea02c4bbad268a7282fef0fa3542375590a1a01147ab418d910f995d7ca98fd9fb278a09a6c60eef4071aad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8bda814f89d5c0595e253e18a0348a2
SHA1a7933284dbd788bcc8490965ffeb61f9c588b67c
SHA2566354e07b714582210995368334967df9079f52df502c34d8a35ce3eb07c7c2f4
SHA51234e3dd893dffe05eaf299394341adebbe19933f1d504c6c050c331fd262819196ade52a18e839ba4cd630105695e1008bca5af94d0ae064144627d8d5bc8d453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a1941ab1a74d7cd16a1aa5511cd7659
SHA1be8bab00c36b48869b5b47b75f832fa63c50b42d
SHA256085ffc8fe2f073499b2a5b78850cef94bd4eb9a7f7b00904032b34edde320ee4
SHA512e49130079319e9ec23b49cebe2a73ca18a798cf160faebb2c5c71901bb7bb8b7a0c88f802c4d87e9f5ea048beec734a09f6844135cc1af84fd0723bca5b7e5db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5954e0b7347a07f1337e5ed8af2a2232e
SHA1f5eb1a9684501bcdc71f719e849c73c0dbe32a72
SHA256558214a8f2998fc31dce891696a0c5458f87a9db8c56fef709d6c851d81f7310
SHA51237e2a65c31aec29f7d062a68cf7c4c4a5ae65c58bf28090f9261d6dfe1c6158932f3f653ff6873f307de2df2e6346310ba9b749fa9dfea4e5dba6a93920fa02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58727a8d893a8a73004a209fd0f9ce968
SHA16535bcd884073accf5d1c2b5053751348fc1d8a2
SHA256471fe4560c5b09e5c7dec53eef232e41be4024d9f78f1b75275c4254cc693828
SHA51234a7f262848d06a952a39933c7b04e11adf8b16cd2058776ae76377430cdd2331119ed6cd854aeb5b062edbce020b3ab3bf7bad057e90c94422478c37b781fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51750f7adcc3c0005b3963ef572bf4ba9
SHA13529c153e28225b379035400e2648e3cc6e179dd
SHA2562a8af2b3edc2146873932b043438200657ee3b373a84e2676f7701e6a1ef9942
SHA512b14a18cf10464394686fa8bf6085465df41858dc3cc643b948e9f9ed14bc8afe637138a98a45af7a495052a049cb9ce29daf1ee557c12f0fd09bb0f971639467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bf93371edbec8d62af3ba1d8bd6b6c3
SHA18530e450bdd3982d55f7db15b1e88d37ab377f63
SHA2563a3d612021f55155137c2fa85269c4eb9c830081c6fdb8d233b98555fa6e0eaa
SHA512f7e54fbe0d6ad2c59374affc1226f3514344fccc475b1090adb1bdc3bf36437f56f55fff401b46ab8de2e586cf701e6aa7e1286f6c8e717f6b7bf71d4a4aee8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509d45e783e0c1a1707c9c862f44ddd7d
SHA1441585daac7baee579c1bb30d66d6cf03f8365ff
SHA256b8307e8d330c14be8c99386273e51d1184ee9c6b5cbeb0c7eecc37f8c0bfc47b
SHA512fbc004f61f822d3b6b4462c0b1bacb60abe37db6df6e8a573f30a2ebe99f391433c43329c153e3c483918227844b4f18dc698efd2c2d171a20b8dc432f4a618e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f7b2b72b4a3e6e5a6edaa0cddda7ea5b
SHA14d434b47b00ffc4149bc92499ed92e6509be7176
SHA256bb650bf8109598c41b1fe762e49396461f41e75abb52956139e2b15a632122ef
SHA512ca918b166995240b5c21bc2001525eb953f605ea98b9af1aa74d1a4efd26d28764e57eac9a827c8ae5417a87e41213054479392dac6ce914a5a014eaba5ec5d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bffe04e0ed1a4abce8031786a0f92e02
SHA18be2c57991761b53268010398f78601581398969
SHA256bc8c775e44f6f454462ba241cae00417ed85aecf2e8c9e496952f5ff1e917d4b
SHA512374ca9aad4d9da4f0864dc80a611359ba73266cac34b1d250ca5d21ee2094ce7374d3560b79f856f1e327e8b2e4e2c16d7f5f6f0ee0d20cadc1ce4a1dcd6a5eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8517856724cdcb364a472f89c42f18d
SHA19ef65913031f2d5dfa38f02be9eab98415109d86
SHA25655437b6f051a3407a6bf5a01e1999a6ce0fd4d699c7530ac136c572962d2607d
SHA512feaccf49c01571cae63d4909419a93cab7ea5289a76fcfa1162bcd3e20baca39cd6036c6054444d712c9995fcd43a46da7d57e1c68ddbf377560ef14a0e2c7a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed8eadfc0fbf02ae500c8f5ffe079c29
SHA1076b4512996e40e844b7382f7adf9e538bef0b3a
SHA256cbdd45acb7460cbb6405740e4ad4f5bae91fc42b8d105d7fce8059a895092d2b
SHA512f7347601e0579055657e02ea0ef6b59511bb021ff178fa395c345e0be96e721a2ef97702dc667f2dbf406a8d428a8f736f00311c33e71510386cd3c6ec9b4a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e43db81a37e54cd8b76b52f08e34d57e
SHA1cb8ba618a1a2b90d8ad6a8974a2922c1c80a4174
SHA256eb7539b28c8dba8a7966fb541258b756cc0f2ad19cb0244a0920db1785ae8937
SHA5127d0486904c9993034c3052f3b115058dea99000dbc526d1c02acdd92fb06053cffc555f055e1a971a2367c84545918934c0cf99fe22b45816a4d706fc433c8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca91283f1cc6a52efe2d2b4ee0902801
SHA1ad6ca58807f18e65fc981f3a09f748ed5a0bd5b2
SHA256b9a720d6e820663e2a186a005268c48ff26414d4c9e12b8078c921efef6db8c9
SHA5121962a54eaf1065df1fb73d7002b363edae0a8dcaf6b099af526dda80633372614734e89d2130d754b2d0566e220949f184ed8bb0e1833b16352a604b9fc07612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5863664462b7ebc4cd68092a875598666
SHA1e36d905e04029651caf3dde8a85df2298b08e144
SHA2562ae92b80325b7d32c4da5761b7c3535e6266bd33d84147dfe6d0550e3a96ee6d
SHA5121121c75e81793cdd3b902d0894375a1144cbbd201f8acf12aaca1d469ea1ae1a406215e8aad70efde632ef0881b878171b85acd577e3d4589d96d70087bb6d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502adae668c5ec4fbad50a210455cfa33
SHA152a4b7d459697da3949c55c732914087bfa40fff
SHA256dbabe7dbc3dbd8fd948481fdf037323ac4e54c06dbdbaa15efce9dd938349ea2
SHA512e4c772f8aa1c7e83d571b52ecbf702070a2a941eb3953cf1a5f2d763282073d6d5ed5f2b3dd339df45cdfab0b691ce454840d34ee247f4445fabcbee4e52e79c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a