Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
Infoemail_Bradesco.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Infoemail_Bradesco.html
Resource
win10v2004-20240419-en
General
-
Target
Infoemail_Bradesco.html
-
Size
51KB
-
MD5
d5a9bcd1f5d90104257c4a72ce114b9f
-
SHA1
9abfee055ee9e4dccfa33de7928f3a6d3c4c20eb
-
SHA256
e4db53d4abaada928dcde6c40f6f57f82d59e304ed6b8617ad6606831770a64f
-
SHA512
da399f31b7f55f3906624f0ed641d62404829bf7d9e7830bd1d8232a80dc48b12fedf8a06cb948803f568198d2c7bc28e3fba01eea1d61147f42a1ac768d8803
-
SSDEEP
768:TaIeLn6Rfs6kNtTVmHQcGzPAerO9KUuTQe0Wo6rlsR98K2ViKjR:TaIe7Qf9omHQcaDATWK2ViKt
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000aa8cebd7ed1fd94761a68a591a0979c68fcd6815fb1af5feff3f49c393b8ca8e000000000e80000000020000200000000a05fee9384452506d2b304c1c310c261c9d5696c9f750e28a9ab511549b99c520000000883b64d497c99d7297b9973c461e1f6e2f39eb873b873fe37f6200c0645c6e3d4000000013469fc6669729f73621fa0ffbe603f290178c2cac2e3c60ed48b48c28bc2ed3cdf3ca54d19db634d754a21d0c2bb11b537270354c88348aa57f9dd5f89c711c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4F58F41-0405-11EF-A4DC-6EC9990C2B7A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50356fca1298da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420322777" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1776 iexplore.exe 1776 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1776 wrote to memory of 3020 1776 iexplore.exe 28 PID 1776 wrote to memory of 3020 1776 iexplore.exe 28 PID 1776 wrote to memory of 3020 1776 iexplore.exe 28 PID 1776 wrote to memory of 3020 1776 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Infoemail_Bradesco.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1776 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce6eb94b4be643fd98c771e8c7a4e9c5
SHA1157de6c61c4487f57590143e2de8d9a862d42100
SHA256b6875063b6b2db3d6560afa0d12cd44c14532e96415e4010b0f8d2efc1140272
SHA512570a30e61a31b3f27df5dcfa6b1dda56fa8fe763d858ba15bdf77d3638de7bfdae847163f422586f4cfb3d0526890214d193a2804ff3d98e9492cd1c5d8c7ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5188e002888dc67f28bd55d9dcd283829
SHA10bb83c847f2e11678ae32046571cca281caf9182
SHA25666c4fceecfcc7ae4898f052552d336c079c7f3490685c900387d5d76317be545
SHA5126843c30b07d0184a37e372ab472673679377e556f1f1935c425f316062a2084a51284df8f6fc325b973efcb397baf0b26c14bfc2c8b1a8e6f1927faeadaba523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8bb2b82c9c4406c58b342b9bb2a13f6
SHA1383bf845afb4d103ee091d1237c75aa6c24f373f
SHA2562698be2068dcd8ff5d8ad1d7d93ebfd80fc1284999930512e2a6554c57bd5829
SHA5126abbce1a511e8b1a094df448f98a2dc2aa3013c6ef61fca06d30f31ca8465eaa093f2f763b212dc53913f16535855d0a34673399aa232a8be2f8f96f884da0c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd8c302c72350bb3d281d8c33f97bebf
SHA138d8db328835111c416779163bc42f583eab212d
SHA256f381b126b25246edf32b56fff5aff6879b7c1f1546ca7692a66882698761408e
SHA5120eba755abc52e109469a65a98d6ac0f38503d1932cebd926aaebbcfb8155c422da1d9a493134677c7f29fac93b78bc097d6deb0baa477d320e60e503f71dcf9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ffdb9dcc0703e044ee91ac0288eaf5b
SHA12418b44d842a337ee7559975deb39bd86bb99c7f
SHA25619bdbd35dae43131eb8bb9843893d938a5f222adeb7b8d40ef52404d111cb80a
SHA512c710912a57afcfc4556efcf38072d674c3c738c373f3118615159e967de54d5a85cf826e28a464062c72f584a7f39259e4d86aeb058e97187a339c7b9f7bc0ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5e68a21bdbdff69235533e94980341b
SHA19d7777083c03486ff1417fc845ca41d2424474ae
SHA256f7c4a7c6d0d0f603fbdd9e2ae53a35af8aeb71d116f9c0eea62aff05d1748811
SHA5125a1af56f6e221e96e5d30afb4945bfe03539aed3d9afb722fe24400bb68b766b6a0fe17b345b363bdd69fdfbbb33a2eff839616ecdf82e9d195f993625d798c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5155c45c709c6738973f5d407382ce2a8
SHA1882bfae083b6d1c82befd80b20ceade26818d931
SHA2569722023a8cd6d715d755c3c189c69d8e466dcadf4c934dabd37d6250468342a0
SHA51299322a4c19890c826ce7a5a94c2b7a0b0dff7f57e3be18cdff77e0874339e78359160b48e1d2681499284d6d4a37c82f50da683ac7fafa6c0c9d0a50b6cde3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52212e61216a804472e32513af378ac72
SHA117eedf271b6bbc2a68582033ab7840c3dfdce18b
SHA2564a4c769023f6f2798d01157048b283e7788f7b739cef943f972dae75234f8123
SHA512c4cd3664677ec569570e9a0d111fb54e58ae5de27c57993a833b36eda6c04aab638ca3903a66491d52bc0811c6374eaefdb7de8d658cdf8377f28c7aeea2871e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53816577993f534b29508e8a1e6d33e67
SHA1897e5f8cfb28e507ee803fe0656bb5845e17e7d9
SHA256bc20e77f395bd9a6bcaf56bdd335f58e4f1051afcf23c8c628b291950d2b71d1
SHA512a19d866cf11a3259c48257ed2feb93da3081b10539a9e72eaa086ce5c012eda6a2dd5b1036b109c256a2d2a82b41595ec346fee8359e1b2b4dd8dd2f4d1cdbd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508d6d49f1f78bab6de27cc613f200f5f
SHA1f1cf84e981fc76d048f856f0649cc0459aae9a71
SHA256dc60e1ae50edab0edc2f5e448347642c2c10d0a7a24217ed032e0e084630053b
SHA5122b10039a14698da4621ca9adc5ad5fff2eca5015c39b5a529fc42b1a430961226112a18c294921cc386afd25de4badec43aa66f4c3b8586cc17ac21bcf299d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506f165c1af5bd3e9f7309e7c6abd9ef3
SHA14483ea4a36d3514fc6ed76850cc7926bb2b8febf
SHA256cdca479c3352b2bf938459125d62709bedcdf199add66f76b2eeccf5c62d4b1b
SHA512955994720c1e669cdbc7ac6b3a7a4860efe60e01240f3f50fed26dcc52883b4ba0e40d7b35487e1ac7cf59915ebe20fda626e73e2f2a3fac0ded798f28ff19aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587a538fe2f4c6701d3db6b379545958b
SHA184f6d876738e47d377515fd8d07cae53fa725824
SHA256406af7848b502b70714810648881a22062bba45f2805c9ed10c5404356c24173
SHA512145d45b035a85c0f6e9c19c2566d2f25e3e9612663cb10c8af69b9beb90ba581264b329f59524b1aeb2579f6993b42020bcae82c88b54c94a7a982cc2da4a9f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282ef77c5412b94fdbd4abef806798a2
SHA1420e4fcec24b495564e7f91467d5818158d93b7b
SHA256dcaed379120814753240d9fdce826644315edc9921a59ecb7cf9299584e98f36
SHA5126511c6c67ffd29831467f117f6e6052527920eee1c1c32af4005bdac2de43f8ec1fcb5b766001b7ad69a7567cbc89cfd98e4f46483c0bb3dec7295e29bcf484c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cecdc462ac15b829e124fb956c0440fb
SHA188c9e8243b62e8a97ffe304d7bfd688eb9e95596
SHA256160af8416ade707cc9800f950b950a962c980479548418c22ca41a16763d1c97
SHA512f191c4404d437ac804ff41d2159ebf528ad12e681ea133cba8e18cc62b0404aa72faa7fb3a5ad05a1edb834c37a0696298e3b4d54c9597f1e95fbb5edab5c922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b358b8a3ebd4b8c71f90e7c09826bf5
SHA12c375f2f017bbd3a787ec8feeadb0e51c4d037af
SHA256a37a751e1c85652cdea0612b0bcd9af7e6d8091f7afee0a740772cb136f6bbad
SHA512ed88daeb1c857d17a0717b1f53dd12ff76a6852713544241130596a369aa064055cb6a8e02059b443cc1d4f6db231d1c388a7f06e6e27a104706fe709b198c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5187eba884f0c4860d984f70ad3ab0377
SHA14fcffbc747c1ff9d0eeb10bf9c69e5774da1039c
SHA256d821c5c7ee8c99349c2d424f70fcc7b73d7aea6c8426fd94acbc5fef420fc543
SHA512b728385a3187cf28e1270840780c186f46591c79e12c12651af6465af8027826f8c6f45687af15fc516b41b6ef0f7173e091fd18ca588ea558a350376e4a54e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5621d61755bf8495122b5d3696c2d79ee
SHA1d77fd6c0627a30a06e201cf51dd37b696d600d1f
SHA25693996b4edfb453de1cef83b85bf9ca720db8977d9c05368e60766b3c4260d6a1
SHA51255ee716fa7829c4e3b5ea9fc4535cb5053c8bb75f5cbe832b25780d63d480bfffbee711c3fec2b410cb6b4f4c6659e4706ba64abba65b3dea1df26fb7975852f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc5601b1e53b65a7f713ba39fe9b1f42
SHA1b857a1dc24f1897e92cc889f609fb0152d38dd46
SHA256c49eb45a7e50d47a84d114ae713aa2990f79009327edf3b7bb710aa047030901
SHA51205f761102cd996b2579a76189f15ef08e363c089369e306bb2f22a47f712ebe978ff702d8d01f9c1ecb2ae4480d3a2da6ba5e07d27be87410f3970e0c685d368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5152aaf91ee42f50cb048741f327b18c5
SHA1d2b6feeda3e90d14c08af85d85b9ff1ad6ed5851
SHA2568cb0e657960c9d941c5b4a86c73877dfa18d85106b5f1498105d8aa2ed446227
SHA512eb69c7e75cefee47dba68f69c0d58a97defef39a053dc105322ed00ad508d5981f10cacf6476903c6c646848483934ffbc4fe441add0c81fea24260df53aedb1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a