Analysis
-
max time kernel
361s -
max time network
365s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 15:18
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240508-en
General
-
Target
.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000f8daa50995048ac414a5cf585736dc49a158d1ec08dc3211a7f095b610e5a58f000000000e800000000200002000000009c90a4ca89e8d479545436c1269af1d6a9cdf51287d20fdeaa4fd895b85c725200000001c21d09382f2ad0e7ac3a1d944ca453b3dc5747ec2cb25543e21b9adefd0092a40000000c9a9cfffdb2ec3d3f1bb9691fdd5d51ac706a560fd89aab6623b7197e65eecfabd75e707200141f75a18d9d7d45468cecf5a00e58de167621efc2bfa6393b6d9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421775415" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c8baf848a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2422F761-113C-11EF-8E44-4635F953E0C8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2040 iexplore.exe 2040 iexplore.exe 1208 IEXPLORE.EXE 1208 IEXPLORE.EXE 1208 IEXPLORE.EXE 1208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2040 wrote to memory of 1208 2040 iexplore.exe IEXPLORE.EXE PID 2040 wrote to memory of 1208 2040 iexplore.exe IEXPLORE.EXE PID 2040 wrote to memory of 1208 2040 iexplore.exe IEXPLORE.EXE PID 2040 wrote to memory of 1208 2040 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544994107e45ba7ca19e8db725fbad29b
SHA1a1bde643bcccdd8b3f69c489b10778c86fc6be13
SHA2563a42ecd31b0db34f1fcfe1178d18cae51ce5376c280e253743666c8d46cdcd2e
SHA512661b344264cabcb74fb86adef084c44506e63d4be922522e3bee212a556088bad2b5b662abb49be82727805813b27f8398bb41b1a5905b9f7d272e465fad58f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0a654968dec8c31f1d2697443171574
SHA1292b2f10796ae599323641f1603c82a13d2c042e
SHA256d24525e5d95702a95b07d2e475210b49d1e7842e8799fc8b94747e8a6a6e6b58
SHA51256fc539ef1622d5feaa046162fabd8195f8ab4498ba55c09329bc5165445e10bbcc786fbb99b8d306e9be2b05d923b297f4925b8bf59da218350438acf993e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e15f15d428c859160b11c156113a8421
SHA1b97713a09c476e40a961c45c51b521735e9e6778
SHA256aaa8f296625f0d0b30cb52a2db004fd980c504b4fae589734f4e453f8a9e1037
SHA51264d8cb5e48e2ef1e356d53d236d6a0ccd095f4e46ee5b36dedd489ac2ac797a741d4be8c64fbd887251da55e811421df0aa781d3da9a0d57e60bc1ce24905a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5009297c8e2c7bbca1ad277195e2c06cd
SHA10f750c2682aab13ea38210f2a1cfda23c7005afb
SHA256f02a330e9e0d22f0850adf017e4a8767794b040dc72c5ff885bec8fba8b19857
SHA5128f78faabf573a86efd123f732c1adeb25dda8988a39f342a4f3c0cebbccf335bde0fd61d45f2ed4a68e0f35530f84cb65fcd8ad5cdaac1b577a47e6d91663ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e30bc34053f8352a588c92ecf06e36b
SHA190e7a07e739e467b5c73945a9540517f9def967d
SHA256b33f8e0517859c307d271f2b11be90affaaa7078dd947854c9afc43d483497f0
SHA512f87e6f6da393c0ad15899fa96f0f14f1e6a66af069a3c0a3a5437e0232070e6e947331f0254906a36e8e7f57cb00bd719a98e97bcf887edb896cf5671a74be1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542c27c6123867aa73515151d185830db
SHA11a6035a14e78b1217684ef0b0ed747f994f51ea8
SHA256ac61e81cee59f8ca4486fdb13df46e88f3ff06d4a03aafb91c21f6cde556655c
SHA51283fb7dd196837ff926bb6ff4af6c7f6485e2e5a764b5631e94d45b057d94adf70e1d5b262568829c03e80a5b787d7f71ad8676d64e7459856179e2b70b0f946e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5614738d4c482616fa3853442045192ed
SHA1ff6b3d00b0f7cdfb1841fc1df819febfe5a58a9a
SHA25663c08cc45fc75754b3d96cfbb8621aa6c971e43a80a03db3670223530c1bdac4
SHA5127bbc9f0c249a2e299cc1fd258ad8767d94da4edd7e6087b6872bb758fe34d77ac25c341ce2554cf3543e345507f247ab2227ed9a27e196c60a577522373cb56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a5346d10f959847aa596cb165e07213
SHA116a474d2961d6e0d67a07e67f32cd5d927553d6a
SHA256caacdef4a93b3fdc8be08bba7c09248e14ae2f223076c2eebeb26c8420a1fbe2
SHA512f68a51949bb9d961615beeacadbb6aa85ba5a00fcad600ea9fbffb23eae2e0b843821b2ddc09a2edf9cacb523f19885e97bf37ac11ee0f6a72506195ead760c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5644fbfdc9dc793d70dc51b46c5e46374
SHA186237475701d7a413c694c51d4151ae7ac4911c2
SHA2567769b3869ecbad688e44a659cb9d1f883a415a0f8f398b1fbba506c7b1ddfea5
SHA5125fd6751eb178cceb66215c9f4192c9357f2d92aeb568c3e1eab1fb2b0c392932a260dac67c4b6a33dc2c5c8730c4b8169cc54c0daff06fb9a73094624aeb1168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ee5f19e76ceda9db3cf952cfd2d2474
SHA1ceb7a2eb23d6dbd5f456847b4ad629fb35fb8095
SHA256812a1fc486a7b896843e3c8890d9bb3c556a131387c80a66eb5cc1bc5277a0e9
SHA512cdece682d3f432b501c0140d49cc6b50293f8bf83f27671d43538b29977827a8eecf3ddf42b0f1cbb5113694ffc56e2b2056810aa8e0058f590ebc73bfc14a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cab323e5b2a8052aa6dc51d42ca0bd40
SHA13a64f9bd32ad9f76512257b8b39c1c0bc4d5ff61
SHA2567d4fa075a444e751cef556c1a7a7a3ffda582d8a308f778e689a00abbc0ec8b7
SHA512a5dde626a075c945068df96989612522e9f96536d6a6665ec8f179166b4330234e856e1e6baf16ced5d977d99296c378f1202eb3032a57a16478b8c264449a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545cfe479f9c057027d10f4208d09ff9e
SHA137332c908fe7684116b0d705ae864c1bb9129ba7
SHA256bd8b491eb73a6d09140165b9ee2ec240651773b3760a44594ad8f221eaf0b996
SHA512b6c120d0a618c641c806ff40664c66ef8258bca1b1ceebeb78749b6152b5b03db37e7ee6f30fd397c197f43814234a20183e7ff7bb3db52a392bf8c3ab57cdd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50765845eda53e5a5a9f1ec462c7e336f
SHA13b75b65aad2ab44a68963a93c4c0563503ed5da5
SHA256b7d2aa3f46e7e561a37a82e16383608d2b73655e789bb22ac05e59783d1f827e
SHA512376d2554c5feed5b248f0a692cf3352e9536f3e6007a565b3c22d31128723f9513eaf2ae9bb025bc9612b7ecc135bde6e22fef042a50f84e45f59d577cfd5943
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1adb2232921b4562a7fc63be2f43a47
SHA1523fa1ee17ddab2cb75f1f4e7b67d08bf98a8da9
SHA256a4424d4632d43deaeb6625b022cccfc72ab54dcaa32f13c6e2faa02e2aa12fed
SHA51209234b5d0118fb886240bc2a2b6d63bbc4fd32e4e7d2b16ae31d0714b43ca4b3f772468a5474c6385db831d216b15a7ff89dde720cab0009d8b28e0c057e861f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7da859be85ebbb7552f925db3f8c51b
SHA1288e2c84291e90337a2fb8d5c6f65918790662e3
SHA256ea9f56268071e5bc1a471728cf84f0ad8c9bb5a5ca4c4063bbe3614eb7b46785
SHA51213265d8ffcc1da40da22795e08d55083c774480545f647b0a99e0051265d42292ea7bbb8432711bf46b3b41cce6c0316bf58d2abee8c0e8aa988a3d01f8d123a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f804884a46ad9c9a3ebdb9837ac48307
SHA1da879b3f7f8ef3f472849d4824f76703ce7315ec
SHA25641fee4f982620003bea1ea803eec05b0bb26fbd59cffb610029f8854ebbdd472
SHA512990c36858bb25317b75b30dc19eed7dd0369f9259bacb1b7b61dd286af526b492db0e0562a162fc2267d5a9542ce08f34c3ca66d1ce9665e811941317370291e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561a6159d2fafda8e7d7cb0fe9b61c2e8
SHA13e3cb5047937e55b79e370391661db42b98dff9e
SHA256e8a008a8302d8e8dec6db46d635e709da9273d5e7ce05ee55916c7eb435dc97d
SHA512461ee9e60d005ed25306936a516a46edd0243960cfbf088e96a3716db2545c62996287f96aa87b4926985a9aea03403c7ba321d543491bc6a0368dd3dd8369a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569bef922e36587549fc06dd591174452
SHA19ed8e78d9cd640290133ba7fbc8623ad10b60c74
SHA256477276c005148de8e1c8a88c6275df6f14354c81364420a49c0917574b65e207
SHA51248cd0c893467166bde636ae9434d3d0c5376eafe60643306751571658f4df8d8a6f99e4af7b062d0574bfdc940e241eb528e8c28daec4f5f53b8405de889b9e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583759b37f1598df2069a2200c38dc738
SHA19e412d4dd32d65d9d051aa1ee160686a16d28ea5
SHA256b9e42869c7bd16f7078e7fc2528e40c24d3fc8665af7bd770bc05adf15de6de4
SHA5121ee869b18a72890d0df5a8cf34d688a0bccc10726fc828bf033eb20bc40e221bc62b64d16d773bae9f26a4a04e3bf581236cc5d18189b6a5e4822c83ea3415b0
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a