Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
undelivered messages.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
undelivered messages.html
Resource
win10v2004-20240508-en
General
-
Target
undelivered messages.html
-
Size
4KB
-
MD5
d66b4e7c5bd3721d5fa8c1978d3253ff
-
SHA1
e01bd859bbdf4aea7a5dd57cc48d2dae714bc253
-
SHA256
5aed71715c2e16685cd823da09c39ff1304bcb84834ac0a507cc09fa58e90bac
-
SHA512
fed4137066330fba53a363765fd18f97463e557ccf7383c8fdbf1658034d358828c9855f4e78c49e21c2dcf23a1fdc9be820a14726229b81ac1e7432c33c9553
-
SSDEEP
96:xCHtPXP/P3lH100hUOiP/m5X6jEIyrm0gecBtYyI30yPyRF5bu:xCNHlH1Gm5XiKm0JcBtLQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422027074" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000049e6b7851ba2855bf7825e051ab40112a87f8d359e463c7b1e0be3f9cf2bdab8000000000e8000000002000020000000bb0345029e72d122dd2e9e6a8c0d337c98c736a772ac0a332281f89838b669ca20000000eb8828bdaeed61c603ff09b8f5293bde2411576985e4571b395c723c1071f09640000000b996874e882d759da53fea6a212367eb8f14a73ffc5531e99bc4ef5d54b8154d10b674ef934051f2e5bf047b8dfe26e6709c9d763227cf3d707ead0b699b5fe2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{149EE5F1-1386-11EF-B937-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e911e992a7da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28 PID 1720 wrote to memory of 2780 1720 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" "C:\Users\Admin\AppData\Local\Temp\undelivered messages.html"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513cb240f879197657a69bb7c3f94f570
SHA106cc76231b00a9183b226551a9140ee6344ad7d9
SHA256ae358df84523fc6036a68453a2938f4a824096521e94646618e498c31501ac24
SHA5123ac71c12ab4df1a3d9e578ff84d4280a89237c9643081afed7f3c9eae95d660350bd263df6b6ea8070950e72593746935256672a5f5543c332287ad4a687d3ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b3f8684f2579e8d9e31a66806ea50bc
SHA1593128bf23313ba137cb69b32080625b8f29e6eb
SHA25629b7ae2aed7ba95a780bd005785b0f3f0fe56f653d6147a97a3afa00757577da
SHA512ba4c179bbaa69cf3c040abc224d450b0d31c7a7dca9040c7a5d426e260834f458ae07cd459042d1d2d645b4d0f15091a1a203f6d23040f0368c85cf15ded9ec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56485ff92162671bb2d3af7a1e9570cf3
SHA1fd4a87e66edc9b833d6fb4acfeae2e4e4317e841
SHA256f1ba76664cd59c362d05c26b96a5d00c084b05b9be4d2f4dec159e29b106ee26
SHA512329aa1ae19ced56915b8cc0f1ad418b263a49253c95e67bf6b3aa51bf8362407b9d29f1e55c9f8d7c68c7e0d6cd86b417d889d13f274f8187d7ca69a3c0bb7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de11da5aab9e4a2023b0264f7b3fa318
SHA1e9d602722021bd6fd002fb635abec27ae57e1828
SHA2564c4bf2449c791713af8c7bf841a4bd7a6b8cbe4c9d025796fcd2de42e7d866f2
SHA5121526d90af61f0d043313359d52a0fa04fa2639ef27bd66612a520831606dafc2466ecad65fca09feeb446c6c79f6f1f31c92b6b986708df74a8eeb55d35f5b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ade17e6904c6f4535c59bb4e90b97c7b
SHA10480aefb14ff5d2a4b50f5d3bc12ee2bd10ca216
SHA256e595efc4b1153ea76a4a07b2e157ccd61779b26cd436f834f916bc220c38ef31
SHA512aeb9f7c4d33645e4e5ef708b4aa8375e25de105f955fdf61fefc237a66a0eec4fc028a1c9fbab192b4a5d169c451ebf0e048562e53d11373292cc39a32d94411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e4565fc3d19596459f7b6a55752ef68
SHA1f4a7e342af2f767941ee4651b771fba8de3c78b1
SHA25656f0a04bacb020b705130b597d468f7f9fd3f4855465c271ba105c0f74e252be
SHA512f0bd4f593af1d0988adc502db59b13473d2189759dcd35e1f9b63dcd360889dd021ce42943d8879be6221c773cb70eb6c2c54294313c31ab7db12a7c1e0ee9aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e50e31c23f436b25b48c3633931438b2
SHA1d5d1f0a459b23c2fe40fd32d0a6a47150773c7bd
SHA2567043697e57e107d6e1c782e4e3ffbcd087ead6aa972f1feea8b55fb614fa63e0
SHA5127fc32f3f1b95e935c755358910634febb5514a9dcbb52b0652cb50db65a5a1df22a5dce54ded6c0b912f6e1197f393d9cbc17dcb023edb1c3d4058c98e4e5856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50032c6ba7b1e43648e4b94ecb0df9653
SHA1de0ec3944c950be2fd960557d7f981d7e6ff2c43
SHA256db5442b80b7190285f6afb4959a863eb33516a6916fa571138c1ecd83958276c
SHA51216cbb3e04ebac70f9e7c814c532679041c91f005fcaa84206ec1b316b11aae1eeba792c679570348881e51da134352d0fc42625643b91974f297aa12bb88897a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a31d845944708f42c408a258c37fbc40
SHA1c2db5dd42ee52111039f3b92d4ccc077ff947eef
SHA256544ca6c608efe546b0f63e2610586ce91a56cc0c9cda62746f2b4e8a49f8f98c
SHA5124e16e16fd4d9532389d72fc797312f53640daebdd6efe4da5e35ad8163025d2a407b12b99238ffa892a5d3ad466545815f910db01f5ecd4153fe1c49d62f54eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5668b1a3ad437800af8a0c618c7818291
SHA1ce439878ed4e9aff55b78d5175da6ef914566ff7
SHA2568e64165a8afadd114ac3241aaec46984c404c4ebd9362c40f70804ee4cc000fc
SHA5127d1034f96f45bee49a356bdbd399ddad2d46ef880643fc19f81b7f5fe3034943c8a25ca89749b154f318041ea6b534cd18e217baa382dd402bb4c0e82773bad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b3e63fe89a87c0cf94fb72e7ce680b4
SHA17c07f383f4502081f50e15e32657fb89665458ff
SHA2565169b9188415fb37f06357b9adcd97a7282a5d1d6aeae1f3f6dbbac8d39efdb1
SHA5120f34859b521b962bdbb48b518cbc9fa75334a7d786415842ee993fdc352f789a44065d6d6214197a6c35bd9972b483f112c207e31ccfdc3dec13ffbd7093a4e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a36c7b0d1e1a8402eb26f7c71300558b
SHA14433b513a4b9acd2934b43f20dd5e6057fb69962
SHA2560005eae7fca6dede4abc5f0f13b7780b6631e59c99e661494218ca77d4ed2cfc
SHA512803c86eab743eae671fb4e98f82f4fbbd510294fdca1e5836a130511d4800a9dae025e40b60492f4f7dcfee194f38c7ad993545bff1adede52b0266e21aed0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a21b5ca2d20d158aec4a37243de4b68
SHA1001980b96bd1e8ede91d1f3e7888d306cf10b01b
SHA256612ba2b52c89eb47df6839836e74c06c6e8eafa104142fcb5fad9f539b5366ed
SHA512bafa08df5878059d58372bc173fcd7fd4e4e96f550c7ca12271c8e4e559ab76f8c89707d358490ea6df1223e587ebb80dcda4c64b44d94d8747499be1092fcf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ccc02a0966e027aa53782e077664d6a
SHA148e12912be9aac43c4d9b5ecb57881ea93684213
SHA25659fce2e6c42ab1b6b9512591ff558047b2a430b6ddcda51f4d51d989b41dd427
SHA512b50ed8d54890fc58558c23e517795d71f2eea66c59a78da182206665961c9e473c5113e61e961dfe2a63e11a21262ce71c7f2051b885e6098970e5633470c58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503012f86f81b0f5a4cf6d995804abbf3
SHA1000f313f4e3035fc9a0827bd9e44e799f079eaba
SHA256d41d48e9516b68243c4cedc4a9000f03f98f0c5cb88548fb93128516cc174bc7
SHA512b28b0ede3b0822a17565ab244aa498d1fc6a92002644df826ce888f046e20451defa095ad0e416674c8ebddea6408d4f2e861285394dedbf405d20b4ba13fc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f614de85b49025a3517f026e4f17d50f
SHA1bf1dcf05861b836320bd832ecd3fa2cede0ee98b
SHA25624366a1903922ab3b038930c1a433ca0815dd7ef9b43f0b0870a615cdbde1238
SHA512f35dd48a2ee48af414f6ceeba4c2580d9cb38275a51d94291e6755ac77b36f1820bd70fc8b3b557be0b2db257fa3867bad8f412486d5e3f44dd560126bda6716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b9808ebfd6f7890fdaea47ff2fed575
SHA1f508a1d928d63d6c636db58ca390ca4ad36720e6
SHA2567d991e18fcc28fe19dc06bea33020042db4877845bbf1f679010e05800300c47
SHA512c14fb830738b4679330537c2e382460a1790286a2e337396a541b6d22a6db61580f2da1f9e17baee8eb513251c36f97292968f2b21414832cb9dc94cc30721f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0f7c7b5905d566d755077a7183f2970
SHA1cd42f3fb7c6f5753486dbde2fec9b20708a7e3b7
SHA256f233d4633abc6025ceee4bc77b27d5598c1e68dd888f5254b49b0f632cfa8e21
SHA512979fd1335d5ee8b2a5ae6c6a4c97b35122de5e3b80d0ac173a079aaddd4d68a96c11ad77d98d286a7d97dd10ffb8cf44ffaeec6d2eac7513fd0b60a6030162f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53397cae0fa46584ba5f748946fc4c078
SHA140f59b8fddf33cd256ba3f5a4371b86bbf365e4f
SHA256344a346032b058cee3256a7fe26a73de0669e59cbcad26dcab215572735ff964
SHA512b4598ba3cde00398da983464ea31ad50ae66ae9b7c695a0842c766d1a759eb45af9a4aa8ee85d401160b6aac44edb410577772fef34acecb2f27015db6dad1c0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a