Analysis
-
max time kernel
133s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 04:05
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240419-en
General
-
Target
sample.html
-
Size
220KB
-
MD5
4990174599c354cdc62ac570cd25086b
-
SHA1
3fb87c388a063c28ece7ad2024c470779bba7cd0
-
SHA256
dee381c640cd7b780983c4fbd08708f18a40c4fafc359c7dcc8409632edf4480
-
SHA512
e3ab78e89d2ec0cf4382dd7c8e502a6bd3245860268e813135b9569a4bbcd2e57670fe8ccabf37a3a7c558f3727166a2ec01e29e729800147e67963785ae6161
-
SSDEEP
3072:Smut7rlbSbDEa7dXyfkMY+BES09JXAnyrZalI+YQ:SmK2sa7IsMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420957388" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{85FA09B1-09CB-11EF-80DF-F60046394256} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2896 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2896 iexplore.exe 2896 iexplore.exe 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1564 2896 iexplore.exe 28 PID 2896 wrote to memory of 1564 2896 iexplore.exe 28 PID 2896 wrote to memory of 1564 2896 iexplore.exe 28 PID 2896 wrote to memory of 1564 2896 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f70f8ee347d3ec364bbcbff7132790c
SHA13dbf8cef38e6573943ebe7dc5a768e883eb9db8c
SHA2563ec171ecab757e1a6d022afa217628dfe95b62ed3e9f3ec8b892a8fceaa2234c
SHA5126f9a6f606ff07a5fbff254f224208804d85d1a42a4740cbccaafe5020de61759f0e4b78e5db8dec957f242e5d7257865933422c6144f9ba4646380e75c02423e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5758a2fb3f453a78b7b211bb2888b65bb
SHA1f3ac64966e539f907529edb19a23ba55c8464ab9
SHA25661146bdaec9caf7b51cdc0e714d5cc24a2a0e8db6e387775e9ab1e8b2cb0de4c
SHA512fc87e372f2db75e20f2088cca39f6ce0a7040092d348cbc2a5da9655014f40a19c5135ce15a442245b1559b087f02090789d4bf824859e780b4aa2b3f192987d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52fbcf523b3a85a8c8ddca1155c4b0be4
SHA1849d61266412f8b27840978e0c0912d73578efdf
SHA256d945cba41dd1236d9582f6336d4865ee6bc18bd99431198e786390165490119f
SHA5128668378a4f16669a2b80093856428d0fe7372f02a998659c0df7a6bf2ab42a2997a2e30269c13d69973b709bce68f0c3f37b39089a0ee9bc2f10b91c01d38cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e9bc827a54d49a53f4ed57b7ce9dffc
SHA1e591ec8bcd208731653d9411a767334cf4f6dd57
SHA256f2a923c73671c009c92da48982fc735a7d72da1e9d0d7becefb1fdf53c40da00
SHA512f85df2bccbaeaf8859ea1bb8b5b3d3d6c2f190183ec4d58fcf68ef41831aed973344ee5a966d71c6600d07bd11fc9efa8c5b631b8d6af90ddddf1b1361e2da1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562b4e1bb87aac65b5f39fb3a06304ef6
SHA139b80f283455b56cfcd2f1c2006d2101638db401
SHA256f20574b748986db1fd72de939facee5c7dd17b0934140a283823bf0be3b33b70
SHA5120d01c8af4e8ca61cf0b86ae085515814e88f776c7b9d79e6e90c48537e52481bfeb62c5daa8df113cadc217ebdeceec84ef0905a0ac35d2eccdad95ef4ba6cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6fc7444b077f8cb80e002a1366b2c9a
SHA13dfb57b74adb9648307b9718873d34486838ab68
SHA25697647659924e6e52637f72d4d4bf6fb69954dfeb408acb181af17a735b1c681a
SHA512d963fe0a2e24e4ac036096fa6229fa315c74d7b35da2688c4ee341f7d524e44b567c06052e72a482788afede8bc06fb4717cb18cdb566cefc1486a927277877b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5918fd98fdcb1c2a41f1f1385a9deb33d
SHA12666e36f8f1d26ccb91a61762ab5ef493498a058
SHA256973bda5ae0bf377ed2b41afb695751f3a3e865efb25d1e6cab3f00620f3d988b
SHA512f8824cb18560f9134018b40b4e1b28718db4f82f428031cd84120d42134b17fe2da700c0a9f515e0ec772b92f116c520cf9fdb1cd964c391421d7f84db0d6f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a644474ff606753c89e7631c4c4a646e
SHA11017e1159fede95b5632d5da50c2c7d8b7a9dd88
SHA256e194473a2ef2f624a633050a6c4ee0ed4e9634dedd946b40d97ce04c6459916b
SHA51283b68a082ed6cb03b2747a52a28253df09db93fc77fce93dcaf636d2ad3a8b39cd5855ca1e5ccbcc13320a012001736d128ad6f2a8c4d277f588cab90c13a10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b14b35b24840d218af9c7b716885ec41
SHA1adf40e275e42f3e06506f8fe27781327b911581f
SHA2569bb136c3b1e5e5a4ddc6606570724a2fb01ae0c960297f4f09d2cba364810047
SHA512908b4d3ee9e5fb91fd8fe89f0ca6aec72007389e095ddbbff38e839930400192cb759ccc7c35529a1117559cc26b6c241abfcbf05825a7c271d9729404292620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56430af7f7a047260941a36c0b51befd9
SHA1285dd57aba7ec14bbbb38c703f3b65dcdeab1360
SHA256d0c2ae3b07e565bbeac6e62f5f56e71e355920b0b76ba1bb06dd2305b0e6b239
SHA5122d8b5f126308ce7a55f810a6e5a01652bd4f10ab88c85d9b8817eb76d4f83cfb780f20b4fdbf39a2d5f9cb5d71dfc634bb1ca659ea66cf54ea0c876d93e389bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5353941095aea0fec6c1fbf61ecf7e3b2
SHA183a17e59d4339c69c69a7bba433c8db990fcbf82
SHA256534a74b3edac9eb871b6974208ccbac81e7492aa1ac3a5310307d57f06a550e1
SHA512759ab0cf674a44cc937b56b0afefc406e72e8515ba438def42e062b525ce1f19f5f47c374bca6c1d1d1fb2e45237272dcaa5dad2ccc712597cd5781c9fafbc16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59650e60afd7933320e91498628d9073f
SHA100f5ef611171d211e558e2afc110f73876a8cf15
SHA256ee8b503ae18d539e629cf62f400b16837aaa777c8726c81cbe67760abff50fee
SHA5128079f2b278865c4cc5eb445868f36558010253acb68d2d669f196fcf27b89bd0d94c065b806cd7305ce5f616a9966a5f62afe47fa7ac91fefe0ce174660b02fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eecdda9f35f1af3b0d0d6e1d8566365b
SHA14dd677e610f9fad04f7ee97988f2068ccfe892b9
SHA2560b031cfc882ee98395738eaefb046651e1a85c0fe9fcd841e4ecadd8dac93a42
SHA51290c6933bb6605514e4c94411879feb478c35b8a50fc935ab4331a3ca1582a2643bf726e3587bb1917724774e86492d35e3a2695c62748180872d1f89a1f6e2bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c9123eaafbfec75d59306d02150ba9f
SHA1f121fbdb2b806d650585d59ce381308bec5e8484
SHA25658d6c79ebbb060760c7069e47d9d964a54a499db03a695580dea6c97c0f6185b
SHA5123e8fd8207136c442e588aa59b9f406962066b6a3063556b9549d917b8eefb8ac21b6047f38bfc155ec9d65f6700b463e49674ee2dd0db71d031de35f78e04322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5805b5b336cfd88487ec63c75464fb191
SHA175f6dbdd89cca6bcf70a176dfb0d2aea9342b2f5
SHA25640796a726b0be9abb517d056429416258c3d3bbe5147aa94bb1c8cee487f8565
SHA512e81d1af1d9f6268cbcc74299a084adb0bb18879e9b0e8330403faca13d714ab5ed07771e5c6b9b7c50ff92278ef0e5b8dd2edbae6d62b1d84229752d499064ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3dc3f19d7d68641d12eb760a9ee8f9b
SHA1b4cd34bc322b2980e1661e55db944838b3314814
SHA256264b4b6efa52ffe957e3bd2636dcf5401c69fef058744a9a0bddf805a7adad4b
SHA512721d5885177d06796c493c4477abb01181b61551c6d7bee46074971606e5b23d6a91bfe3c02960a4f832bce7299b038b5ae718a7653c45145b1935a606a5dfe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58274a547480bab30f416014d009bb735
SHA15d89e9996f83e9b7a20f992e272db4a911d9dbf5
SHA256023ce6e20ae1d56f12ce9bd623c5b496a3cdca116ec65b46fd05de5581bde9b4
SHA512acc1b9974847165ce7e1e1b0a2b846e5dcb53f9a1670865b9e5c75b16b73f5fe345aa32ee4f8524a8c2afbef5db0a583f374ec270571b1759bd732d6135ff54f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdca0a98c40f24cf2580e2fc8e3a5341
SHA1bf500786cf57d1bb28d088709aadeb12d5a9552a
SHA256955cec7bbdf0b8379e4bb038f360a67103f7ec2d2a091be856a94dc9f80a6c6a
SHA512ee5d5bdcdb37403aea6bdd9ee6adf51b4bc44c5738de79a9c9f2209f11ec3d115a0b3e424110ed5327d93f7b83501eb890b745981c818ea7dec5021c154b34ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7a580339de4b0558896b7b255a89927
SHA1a9a02fae8243a1dc671601435a6e3c6de55e2159
SHA256fcc96cc1af85d643cae71ba04471d3aa7a318b9e259f25b0bbe1d2e8b1330204
SHA51206cf7e4a27b4d330eb5026089eab6f065cb2fb81f3f2e0a8f13fdd8658312531c5e3e422a7cc35daf19194641c451b8edbdf0cfb79c736fdb0e45396d4dafcf5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a