Analysis
-
max time kernel
1562s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
19KB
-
MD5
a3045ae45634fc24d2eefb6e666062ca
-
SHA1
4c058533761a988a38f8be2795cb63fcc4157df3
-
SHA256
a4c38f3658f5d94e169ed54d2cb3e1e73975f587c85f35810275a037702c2864
-
SHA512
6090a0381a24aaa382c4c6fc51b56b374be308e044875dd3b2182ef209937556502fd8de9005851706dea7b7f7bd2545f048788d19bb5c0d2ab1d8362f30019e
-
SSDEEP
384:rpGs+DpmReVoOs4Xi9ylKeGMFU8HhhbNNI75ko2paWhOwob0JN+LIJCgMmVn:rpGs+BVoOs4XmyI1MJBhbHm5tWhOwob0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0024b02006a6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421856659" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C1FCC81-11F9-11EF-A5A7-5A32F786089A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc233000000000200000000001066000000010000200000005381e44f418fa2c50bd732979ab8d23402878dff0d2762d41e7c1ccd3a380277000000000e8000000002000020000000e248015224a80ecb714f781d290c2fc9488c31c82b8e2a45abd6c0b4f0f46005200000003007892c3fa49ec6db799785a676bf133dbc4df75b6ffbf92df2cb60600f576b400000008c23775c9084e422c33f0b5a351b9f5a3d096e2753da2a799e583961d7e7ccf22f205595931e5b318f4be8c6df8dfac886cb8c120b50626ade11da4beff05eec iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2912 iexplore.exe 2912 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2668 2912 iexplore.exe 28 PID 2912 wrote to memory of 2668 2912 iexplore.exe 28 PID 2912 wrote to memory of 2668 2912 iexplore.exe 28 PID 2912 wrote to memory of 2668 2912 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52650c32932bc4f9246736511fbd30d02
SHA1ac51225cada8762485a72fe07fb8f5a9968c7712
SHA2562d8e367901616c9771e6435e67447fe9bd610aceb3172cabd44c40822c305283
SHA512b1f2b5dd24ef77d96fe0b70b2dcc90bdbaaea57ce42c554fca9cec269aaeab98e3884c00cadfce80200f95f3d1291d52d639f3295019135e132ddbfcb35b1273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5db274220a6a7f6609e44fe9bc23607
SHA13def9457df08e1d5c1b5df0742cb24e745809e73
SHA2561e32932d1dfbd633a7c597e34da22bc51a993b141a217055a938c48e6c079b69
SHA51229109e0d6939a8d08f7627cf733b894ebe6e66d752a2b93b48787c383b9229551ece9102cdb0bc05360dadd78844b79d87a288c687d6ab5e1f0ceecae90547e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5075575323de173acbf8c7a42a1830de9
SHA1fa898863cf774fd01f1107fde1f6bd924055d0fa
SHA256929e728070492405e136e20e0c36bb7d949959d3b3891e65c5670824017f3be6
SHA512249b2d2e83fd517de224bbb1f07b9c35ff33f19bb4917715fd46a7bbf2916c04fae4283705abb100b7a5e5c5030b372b4afdcc67495004363cc3c1e972712c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587639dfda44a602761e237a86353b4f7
SHA1e167d96e96cdfbefcf53b9dcfd136703c217e1fd
SHA256c033d3e0d1a7d1280ee90ca5b39868343d59d6734701e00e51a512a12c84da65
SHA51215ee8a760027a887417fe379f55e41973c7b2b82e6e6fc9a215fe3a1e4b59db96e999179c9f2232d0c6e61b736d55105d73c849bf9933bc88ff5285d08c034e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d08b210c660df829e4e3ad7485e29e0c
SHA158988acd9cebe5a4a57869760038f3180a2dca71
SHA256d573fbb76001dcd44825e1f655d0abd6b97246099fd8b4c5afe114c31aa219ad
SHA512da5d9c1fd7fb7ae3423193fcab97f26f24a09d3b010f6607e85dd1425d222459c45a54ce5f216e6c05192aa617e9df066da9c53497948a0e5b3f8d324791cc5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532cc9149ff91a72d38e0dcc31c5b3a90
SHA18386d419b2adcce7a1742d4e242847b0c638612f
SHA2568785b9fabc0342108cf4178560807cc59984b1955f1018413c57420928b4926c
SHA5122201ff61651f35bcbfefc88498d26cd06b70764cf1a4c5266d35a8d7636963fca3077582eee472da800916e26f237ddd3b705b104874eb88d4f33369f5e9b22f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f45b0bf8c7e339d28dc18cf0a730c3b5
SHA181f9ac7737e3e873813d423f68bb65b4baa01905
SHA2569b245377f6318efef52d06dfdfabec95f7dfa32743cc0ef703a8361e659c9043
SHA5120452c817ede562e7a638952006d2163f27ae3616786ac0ee02eea2baa0671d876ce194ce85eba38d78e03874dcd9858a3685429411f56c0f19973f0489964e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5170e7e509e6b42f5af2c7fd028de85d7
SHA1c5b2f128b7d60a001e2ecd8175e5267876445439
SHA256a0d081114884ff8d3228ae651f94dbf023f6a8f404b44dff6774f9940d4592d8
SHA512de556b898b2124473818aec4dc5aa942f6f9e8dee024acc80facd394dada840f19a4633101d6f1df8bd2166800bf373f51df65d0122ab1c339a7c743a69d9689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3c2905954b17218534b7a905f0db0f9
SHA1ba7e5f737ba2402773be1596412850198c2a0982
SHA256772a5e89ee8ef5a07375603b6ca609dc742a53e99c022518c390d1db999ac2ea
SHA51211ed6073954318924544abc2f8768e79dc8c05a0f4eb948454446a871640cefbf7699ab6f621be0fc4c8d02d1ba6e280d3323a6c4b504b721b8c7f97e0d8c316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb5e661aa40a2ea30fd90c47df7b937e
SHA128fe99f78c7743c187396a0ef0435e785ae1a23f
SHA256b29c7fe79d70f148004446d053814b74e13e1851b6e0cf381d92b624e6c7c140
SHA51202bebc1d7f1e83821ad21ff5d933e2ce2289b03e21f3ae23c5ed6356cc5ef88d6e29d3f95d90d5ac78d3fac3952a8c392acce2a80d52fd1483b2ffae7abe5ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529c693c99543d914ba216a6e2e20a9e1
SHA1b2bb016884a714d628737a45c33c80ff2da97e5c
SHA2565e1030da87e0cbfc295ba94539c608b3522e2e277efce6475b4d7d2b0dc9c4d2
SHA512bf4a1f0f7daf0a20583bcea173bdd924881834f7e07656cd95564e5a80bab3e6d1e6079910a0600e9ea1cc32410f3617c3d81b339e5232d95088afc4979892e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0f9bb86d1e4b3f889e6e7cffc38b105
SHA130cbe54e1d69e9082449cbde27409952b1b53230
SHA2565328edf729e5bef0f40ebb4dc47f2cbaa1610963581fdb378dc75c2925d3c129
SHA512d47373ba2fd11824df601eaf330e1ac31dd389bbc60eb9b587dc05ec73c3ab7493b84d4630eeef8ee2e2616eac302a11054dcb6c50270f06bd1fcf0d6fed9104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57569c5fa50c378410654c81ca48000cc
SHA1b1ffeb24e68de5239a16d567c0dac9e10de59c76
SHA2567599e9a955c023cda0419944889dd1697d0b3b90763a5394fca77c16b8b03fd3
SHA512aa5099c27c631069c705438217c3f0910ed462e65659ca90049b81c006d1bbb6eeab2603b03dfbf8d98e9453b04c67cab037dc0998a5f2fde4d599c53d120737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d8088712c69d209c316de4c9343d220
SHA111ced7bdda01d4230576e3bf0c8ce61bde932130
SHA256c900aac4dd2b663683c27db7db90685c0584ecbb77cb6325f5725a62d6e8aa83
SHA5124b3200591d5d25eab0114b0286ec15b1ae40277ddad427fe5942253f7e7f4e5847ce01eea397e0d194c26b229e3af13deba054cdd0ee5ab60db8281653738f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584fea533ad081ae2d4db36895138a877
SHA149f46a4e26e0b07e0f42b0aeae8d6a409b4be72b
SHA2565305920ca1b61fdb01cb7c2f11197e1d503c7eb9906633450dacb1d758fb5873
SHA512302a6d355b5a7d9f53816433eb6cf10dae0cf7e52115b2530af3dd76c46984e9657c9007ea29d065e9dc9506fed195084813d31f055fe1191352fc485e90258f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bf92fd6ab423bf71861324f357fb20d
SHA1560420d20983a96f2cd08b19922e829eadddd8c2
SHA2561cc0b0be4c51c8728fc1cce8804cfb11bce4f985707a1069bebc5b2e44ee5c10
SHA5120566151864f3fa636c336a7165d616786379fa302beaf4a4726fef4353408998bf26f2450175c4d3e60c840be16b365571b1d717187a96c187002f74d5ee4b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57839aecf7ff4f4e6f93479e0ccd5361e
SHA1bfdfd03927dd048f13f499cc850408e2daa41138
SHA256d7f87247c7796c65ed034d258079fd3691bf93bfaee9a4fcb98a6d7df7f3eced
SHA512c262f2f03c5c5f44e7272bf2d99f57620f1081fa73a0d8f17da32bd22e9fd5bb931e0fa8d3b12a5be254c4e38463556707fa4b4ab8f34f151cc1bb18cc5c675a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547154f918f2264b8f591b2adf139605d
SHA114390b80d00abf6cda0f7b723f188ebd30f3a577
SHA256c7087f0d29a212bd4163ff80b6fa3b0b991c60e85c9f13b7150bbb0cd34cd98e
SHA512fa3d45168a885e255daa9462e73fd99d97da03b77e7732d932a91d4e4af53652adf71c06dc699276d2f2ce39e9a2266517981bf690a558ac1b4cea540c210e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e58165738b4a8049ec70633394c7a862
SHA1e98c7cf5b45ecd71814cda9072a565262e98ea8f
SHA25682de35d737f49b5393b281acece81df2361e461513a8ac967d66638ee33dee25
SHA51271eab6f3462e5fd57dd5ae567c2f63ab2ffb6df701f4db851d58b388155a972350517754834214765cedaaee162f930e131ec7900ffd2072e433d05e8707b45e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a