Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 05:35
Behavioral task
behavioral1
Sample
How_to_backup_files.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
How_to_backup_files.html
Resource
win10v2004-20240508-en
General
-
Target
How_to_backup_files.html
-
Size
5KB
-
MD5
ca755d1b017d2fffd8cb74e1387d335d
-
SHA1
e99032275bc818746d50d9a2e86bdee6376c2fe4
-
SHA256
70f1eef3c26aa97cf7a4213e1167c706bcc99a0c8253e60afecbd6e6cb6e7081
-
SHA512
fa0cd1268931c45edcfd4defde50a45f743bd3d9c18f2416f53a6967c55ac1166f1e0899ba025dbfa6074ecd73e18325233f2453cd550dd83eace337b2aa9209
-
SSDEEP
96:8y+cAl5azrn+DtZogiON7FmugXXwNCY9ceZiKFe8LeRjdO:8OAl0zaDjvFPP9ce0KYQKO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30C84C41-0E8F-11EF-8B6F-CA05972DBE1D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000038007fc19d04aac9bfbf91afe63d9b621e0f9167fd2d0951f8c9d4de887df043000000000e8000000002000020000000ba5c1c4f5c8f28086ac6093386d568f94ed60482198f9e9b109e461a21dcf64e20000000e140c82a876d3bedef428154cbe5d226b1a00f2c8a2a62459059c27aa1538b914000000029e52d52c9f781dfcfa7438b1d682d7e3d49516a65c2e9f6ffecd2673000ee64c96803f4d5d4c084e7aa50fd3b941e3fb8e0f9e530520fbe79cc4fcef8d14722 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421481230" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30864c059ca2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1956 iexplore.exe 1956 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2712 1956 iexplore.exe 28 PID 1956 wrote to memory of 2712 1956 iexplore.exe 28 PID 1956 wrote to memory of 2712 1956 iexplore.exe 28 PID 1956 wrote to memory of 2712 1956 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\How_to_backup_files.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555755d2c227648457842888d16fcdb98
SHA1735ba02b43a9a64247c8b12af21fd020c56610f5
SHA2563fbb52c1edcd8922af17485c8ed395460334526aa62374ebdd5d9f66a7bb9b05
SHA5125789ac28fd876a390de472c0c6ec4babe74a612df0296a202a2b4e208f7af5d01373bf0925eb6d9e5c227caeb94047f9780ba761c902b08c5cd748a2f0700cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573f9fbdcf9079f18b4387831197b266f
SHA14676f14081c0d69f95cb62723722c7c03a2df593
SHA2565d50d337f70f175fd2650b644f7f9672c350ac64ec4794f2744bb07869255467
SHA512d304affd005b88858ca57fa065b1182b4c68ddac6fad87c3a5aad2aeeaad444ef37ee622d53054c6591880b1141d80da1a330d24584ffaa2db98dae35da7b28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5e30fe234d1a75db83c3a7ece81d439
SHA1153c365d47be5bd7a5d8ab79e3736f6c44e18e04
SHA256d6f934036acf63becfdaa1b87dd21b6daa3e3e848aa81740c3869b1f81aa63ff
SHA51216ca45a767837873193ebc3584782cc4b93e05921f05bbd1a35341bfdab39adcdc37c61a22a080d368d1b207ad2ea58e471fc74c5f0a409c087f967882042744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cdf02d7de8c39af095891964da7b820f
SHA14bba9826582282e845874be511d5a65a0b0acb2c
SHA2562b1c728abba56122f9f4048dcf81b2a968eb8fc8af990d47434c39e8dff81491
SHA51206740b2d13c7cfb8e22a948257c16ec4b212345d8dca17c77b3738cf74d831cfb8dc20cf69dfe8f5860349a17b83a55b5196128086fb8db4bc13a1ead72e2544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a8fa5720919381c00750917091263f
SHA1ea6d492ad61161a083a860fbbb4f44870affb8a6
SHA2564b90adfcd76ff9003004fe4a18917cb20690ad70ec65c616b124dde52f67f56f
SHA51299ca8640485f02314fef164be6266a2e0126c67b40a5472b4470c1d9b14f23eae160b671ffe85ada4a876b345f5bedbae4eaa6f10560f1fe024cd40b20439afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df8ae6aede0ef77850bf63b5b1a4ca37
SHA17ff4874cb311844795dd81d848585827af492850
SHA25647258b7de592a936c0d0ecf7f0f351bf6caa8ffe342d2f6f8e1f69ac5e2b000a
SHA512fc4e12a0d5c4dc85b9e35e93f174640cc7be5b33eab744dbff7a0cbae16f8971af0615373761816268d794ed3b42278ce79b0daaa7bcc0331ab586d4b017d947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5700d0dc42f0848641354ad06a5ee3b61
SHA1439318f48f7f8b98ce9bb93ca4e7d77b217ed6ab
SHA256277a1b5f48b092966d6c33fc3c21cf814f7c0ce9bc6cdb1cf86b13fdc3094c92
SHA512b6a641647ac4584db91bbc2f9e91ca705924ac57ed97797dc00ff50cd9c00cffb52b9678a74c60052bffc493e162758f5ec7853bb3b2419a4978ced3f699a83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d564ee5c428cd45fbc2cfd293977da5
SHA1857be31352c2de4940f2a8ee01a8fae91dd43b9c
SHA2560d9d682c631a8e4f05d0be2c2ca50ef22e2712e0f864fd8d00d4695d503c3ff3
SHA5127abda213631b04dd7630a0237d57c15024e0c0fbd15b7a5bf6935fe225fb70a8b1b5fc761e4a70ec552b9cb68ead33f861b1e92352b126b6dfe066d2efa55ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf2db309a179c76371cfbd4bc1197e21
SHA106c4f66db5f230969488c3cdc65eff634a8d191b
SHA25603180b0cc1d3d28a1c520ec3c29fa7bdb205c1d45c38418ca68cfdaf9f6b960e
SHA5123318367bcaf3ba76c2130bb04582b50d6b88106600af6419ba54dd129c28ec821907ba5571e513704f8f81a48b6b36c11c50f0efa96d672f60d122b7c0c5dfee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524031fa861ef6fcd78c04e6e043cb680
SHA1baad04f98c4670c6bd443eea31ca787a136db6de
SHA256a8d758d017f610d42a56e2ba927b779371b77a4003a28a692db2b279ab93e77b
SHA51260da4d381edaffb59ece07b4badcfb3d02a3234051090aaf9c6936ed674237686cd01a9b348747c29e694ec89ec7b69c9ac96fe1f7182feb8f1e2eb2a48cc583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1e829cb3e1faf39ab2f7a495f53c9f9
SHA1d98d73caed7984f2dafabfd6e8fe5265692d9de4
SHA256599160e310263cc4997ec51a50650f254683bc7db03aa6b15f8a6cc2506d79c0
SHA512691280e97f004861be6437f0b85ad142d62f519c28b30e78fab9f6f41c37f1b2dce61012dcef1b13c1acaaabf8c83c17af997af4ee7b38e820e7cc6e8808d936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ac3f9d5a3bcbc70fc31551c1cab60e8
SHA14bf4fbb42ecacdb8f96d4ddb6f9259a103cc11ab
SHA256c0c0c13396ed1c877369078272ab75028035ad50c2d733318030cd870e8fbf47
SHA5121b4601b2fa82b82d25c559d93fd6c76229a19f29afcdbc75617d2995dad099aa5036cf23faee8304c91f5b62e78fc4d12633267064771472ac3ccf1f6d31fa17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c3edcfa7f520636243eb79428865996d
SHA1baa9cbe588428cbcb7af13cf91aaf007832f723c
SHA2564690b21896005f7ece4eb99802635fef942f65285ef1a6074527eaa4e226fedf
SHA5125e92fc94dd540672c7b3899ef47367f9781d38471514950b70f20df65b0feae67949f0dd6e6cf984fb3b7fb3b080d3d2fcf4df2af8ad8cfe61db5b56075ac0ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5007785f20549f21ba909e311d8358bfc
SHA1ba4fa0a9b034f99a45ebaa3d681a96e9711cd1e8
SHA256516d0be58642673cdfcf3bc759859a2882f904862c9b38e866d48372c389fc9f
SHA5123eef8b9fd8daf11546461008496018a380c5f79bd7d585b9b31e74642e79050b6a9a2c22336604dea5af5a421dba2e3170191bd8cc9b502956f85fc20884a828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dee17def49317ba66c118ebba4996f70
SHA1a07ce0eca24357badb100f2c07ce2c52956e5c19
SHA256ca710e8552e6b130ddbe9e05484e24f4d88dd8192682e2bc15527a18c98e9e3b
SHA512e72d55d8e1c31cfba04e0da2228419f6eb1bd4bb184d4892dfe217fc6b4759cc1e094cd241cff8058f80dd7d0ff14658b615cfedea57d5b4d431e4436b0d20cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d989b913ad9d7b6b307227277ae959
SHA17e5207481a5af99a4514fb052c543a99002787ef
SHA256ef222d3b8373e9bb8e09e61bce1fabf89e59782792f365e3292136cd0d992ce9
SHA5123b8cd770f17ef98e942eca16933b11ad65f4c252d3c3908a36603b7692fe1d28c2fc811eff346438e4adef5069afbd2f56884b779edf64e3dd39b012c4cabbef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5344adc94295102d58f8cabaabc36e449
SHA1292971facb4e452fac33e0daf229aa9e8295947e
SHA256e0a3046e0580bcf5345aef57f90a776d84d64d31ae126ec22be659e8adc74ad4
SHA512975a86dd3534a48f62a5052c9a74f57866d9df99b334041b247c09201f2c29d7105cd6612c67b842ffa39d3e44602c6de94213562c077b1dbfbe12c98896747e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3f0ff0afe141b8bfca5707fc127f511
SHA1212f50f8e5496289fa6a8d5cb2c6787ee8c63611
SHA256c6830a1494fb7c72b95c4d3a9fbe8d927e715f7f1ed8ce04036ef4e6ac002bbe
SHA512658d33fffb262d59bd7a7b03472e25f670c8416ee13e9f0da81a510894eb4996e4415a8136cdda77f339dfb061c4268f95b748cb75530d545d0aa7bbea6f00f3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a