Analysis
-
max time kernel
132s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 06:59
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
93KB
-
MD5
21b052700a7bf058da1f778f7e165ef4
-
SHA1
dc0205cf84f0beefcd936542c28184c5331a8723
-
SHA256
c7c5019ee310a5d6b8311e832429a3832bb2c16c57b88d85d1882e6c0b5d5c6c
-
SHA512
6b2b44000a5da2e733cb0baa28f11fe2a77e2be43d1e6c4a3e73dc477d28e2de98c3acae87b49ed8fb0199d832b512cfd9ae30bdad8bafca1db752f20000afc1
-
SSDEEP
1536:Ukadf5DAFItlsgWdLI/bNeinw/lfQKG3zHchU9ksDT+zDai:Ukof5DAFItlsgWdLI/bMan3zHwU9ks/A
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502e599f56abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CABDB341-1749-11EF-BD6B-4E7248FDA7F2} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000007845a13d1250c70fb6d45135d97ce0147ec4be35c76ce1f8da94e3941a62b923000000000e8000000002000020000000fdd883edc15844c032bdd2041977f00d3085ecaf7dd15fab0752d6095ffdedd9200000005389579b5e4373161887c209f833d6a3f7a40640c341af2abb1c4702b65349944000000002bb3f47e03ab356648ebb2c26aae2c60b901a0cdd1d5b88c0a1ae439be0a3cad58568343296b40442de6a76b8269b762da1fcad22ad10a903c0649142293c22 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422440984" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2600 2068 iexplore.exe 28 PID 2068 wrote to memory of 2600 2068 iexplore.exe 28 PID 2068 wrote to memory of 2600 2068 iexplore.exe 28 PID 2068 wrote to memory of 2600 2068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8025ff77411c0fad700b72e590ba862
SHA1cf1f3aa145f4d7151aadb49722625e137267016c
SHA256b38407c5b2e7eac72e8c35d14efbf22cf06c999a308c4cdb430197d0b2110c4d
SHA5122970b148d8e0d9ff7aa6e2aaf2970b06666c372e913567736c9f1f9dffb2333047267efe5362f1bc3266c3c1559204167ece196c645ca822790e39e471205156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514fe6f1ed82b3244fe8bb5c483e49db1
SHA14fececd5a96dfb5dbcf4c3d88b8ea6c13960d919
SHA2566feed60d95d87844c1d79b19c8aabc45ce7f0cb7f6dfdaed01bebd3efa849219
SHA5127afdb049ce0814c5b21758b352ff50de2f578625ae45b68b512ad80e87078502d395eb4781e9d813b2ed9e39ce36d04e7549aabb1d273d377b7f297e1a82890d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546e3af17103ce269b2b99a4f1f0d4a76
SHA10a1f657da3ca3f857f247cc6ac266a09acb62e77
SHA256198c88f99de9736c381f19d8706d7cc0b8d48a95ec48889fb1ab8d924096d061
SHA512763756ea00b4459f2ee409939fb9703ed4bfe85c81fc4600b0be43a018b1b15de92f1d672d1bc3e0f9f908a22a776b2b55712963962a8a03419f02d670dd7485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bd64c467f0ed4845bf62ba9f41984b6
SHA1acfa7e962891db5130fd434be2f9668b2283931a
SHA256ee59a00b2a0298bba361e3f21b25516d88d6952ef0bcfc119d9da0d3244b110a
SHA512dbd95c67924a028515953d1318dcb4fca09d9a59f5297c70f109e1cef0c91799db75fc4d02ede3e92c3547b44b7616647c303770dd00243ad4dff5d6cc32207d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f24d34f7715d730978bbe2d9406fe1bf
SHA1a9971b8556d9657beadfdf014e12cbead2be4d75
SHA256e48dc5e78300639a029e8063a91afb31b27a4ce9b2bb20bf8df02773b119fa36
SHA512105d2a543f72c6c93c6b32e56096ecec49c76fcc155b3f13dad5a452a280c283cf4000c8fdc262a0dbde67816928c20a33ad2f656083d3c05a7c268c02eda80d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594a0d80113ea99202a1cf387cc61ded4
SHA120e393659e052a644c1a7e4f8665531d65c85152
SHA2563c481bf17b9fb3c7657e577eaff35e5971473fe0d6f65d9aa641dc09d1f96ce2
SHA512513d870be93c131766ab95a66ad245289e38065e20cdf7b62be7d0d29278f4904d133aa37a5bfa7f5eabc00eeaf12c7133669c8d6ea3ae77ef0546954d34f5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a624d22a3d8c44f0211e68664ec9ed7b
SHA18dbbff519359cd805e35747902bf27a5b905b5b0
SHA256b22f926f1baa12a093efc737a4852f07ad9a2189e9b6b23e345ace226a12ec1d
SHA51298782d5a98afaf7a2d361ddd5dd38ffb2de3123102cf217c94f71ac6ddb02d7358ab6d738a370b0c22cd55a8474a46f9801f9f6c97de3ead58db1ed0179ec5c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d81e310cc72987a751eb8724ade90598
SHA13a7dcd5db63e1e55e6a1fdfe264d83813070aaaa
SHA25648b5f1febabda2af3e30089dfe6a07ef113cbbacd1a447a1add53d6c0093c100
SHA512515922faa87a3695dc383d26435a6413a0c558809e75821d59676f101e0c96bb3e008066af9ee24900133b9dd2ab5aaa092f6c44a9e2ac4b928158dce9002e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5923ad0da6e99afdee3c7036d774ee85c
SHA17995afa4d29f2f821ab9ca0b815c5cb29b3fe7ec
SHA256294292140041f42fcc670fafb833d7e0bf88c1596ce7f1ff54a910015ff85b2c
SHA512b834d978de40e1f028baed038255f1082eb917112e81a428add8be9b657e2b8d29ca3bef13a1e90ff779b163663ff6c68a9ec9b47e27f4f32d0ba5cbadd53d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a1f11c6d4c1313dde950063b20d727b
SHA10be0da9f92c1cce4bf258041f1e1a51e76eb8bd1
SHA2567a6721caaa534e23ef4732a3b15174f4b76ee10244e58ca2bce5a310f3ba4d2b
SHA51231d7e194c5cc1cfaefdffc2c0e00a769f3616b4a6d603816a2efbbcaf6c9534e3cde095534a5f7d947f8a390a57d7f645390cfc8d106198e6d90745f1bd67a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51994f8c8d6a0844cd36f0e2f899efc4f
SHA1b9b663091eaed786eff711bed815f43a9ebca760
SHA256fe06456e13cebe82053ceaa9416e50d20305a56ebb7b8a36ba322d84c1f5bdf4
SHA512dce3042abd3a4f12a9e12694513e70e0c790245b9fd5aca7eb8f40b6745439c659db378c3a79c75b239dfde67342d26356eeda59255caa76972cb1fea17ad04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507c3227f71ecf52401ea757c84a27813
SHA1581b96a52a9d9f2f42a8e7302f0e198ff2edf0ba
SHA256d999b10b9fec104245a7a5c3bcff1c6af11da2a7148dbcea372d76624942a345
SHA5122c9211694f5e56993531e0b2a053d69c62e74d7b64671c8f3929dc678a59a23606c46aa1b4cd67582a58673bfc23c586cb9adbb11637fe7ccd6383c7a2b87709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518b0f29bb578f6b34f872309f00804fd
SHA10018544c9c525bb6254b84942acaccd5eb95318f
SHA2561c4c4f14840321c21bd02a799207a0f7842fa2302cee5f7d1776533bbbb1db2a
SHA512d6102e7612167fcc0aef97c467548b4ad20f3ff380acdf04a850aa7e4454f2177d6d4643407e0ac00cef5413811b3b5926714a1fa7f4e264b81aa391a5dc09ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ac19bf784c695636d502295fd64185fe
SHA1a7d1dc5b2501d9030de73a73897a4118d4815c43
SHA256bcab6f665b61e7656ddc41bb070bda0e0a43d6fd7014457067304c7332a52b93
SHA5120ccdc64502a129cef62c745996ff3824d356d7112ba311d259c4ce4df392e4d5090cecbe695db73692e2617c19956f3cd07cf99483868b564894d031fb03f337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4f8e43e30875f290748fb612a25c3e3
SHA162938f73f52ee28d70ea5a21eacfa5b36212b28d
SHA256ffc5b198d4d8711be4ec91ec6521d28b1c9af09497e39a36e9dfce9fabf8af47
SHA512ad0edccff63f02752849ae46965ccec2fce3674d491a9da5ba6164f9bb1fbaf0af9b94b359875d456a2266f02bca362f69aad47b0261eef3071d6742a6884dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55504ec4f613999da9bd60914507d2137
SHA13b68a95163ced79365ea100da57633077b6dfe09
SHA2560af44b56c6b163fc16abfead8be0a86ed30eddfe6b521c108c58a7a7020a2371
SHA5125cb5458def52c1e9d6ce480ab1cafb82c3f1948b17c2aa514b51bf7fcaffbb1dc2531659f0916d03f1ed0c8cb7a591bb5a4a6b60ed1b956c709b0633089dbaf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dd6c1a20d0505143012d146849e1146
SHA11bc7d01514bda128b28bd1d03dd1e28f54ed4e81
SHA256f5878421ea17bc9a629c4b6a0de4df645abe0837af7e220de81bcdfd07f1e2dd
SHA5128f9c08deeb3898a5ccc854615de2b489b2bab34c141d2f993a3193da3f5bd2a203c1c3f438cfc4f9061f1d05b306c194c9b02d12c967b940d446ffe0d85cc70d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd23b6362ed395c91f0b7ebe674b584c
SHA128ce1c32642c5b87e1f81a1a3e5728657c2b7555
SHA2562847cdf8a40306f842b46a4a03d3b35e3f4f382693b8a6606f769f8286d8b834
SHA512610d0509303a9c3b5f1e31aa8af75d769ae978cce5808844ede609419cbe6b4ca574c2f869a8a1239908a224dc0d32fd3b76dbde2ef3a86b8a76d114836839fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b183ee0bb73c00e58cc9e29164f0dcb1
SHA19f877b4e35f3b63726dbec63ee0142a4117f8d8d
SHA256319619fc726351ac925bb1a0668a3255cc355d82ddd81b42393d1708d70c8735
SHA51249e8665d41f63bf1bb35bc9230571a86df3949d9a3fb3e373f34fc1670b4b2afcd0338cf654edb758d4798acfddb07870ecca4717182594267cc3b03404d6090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9655b47599ace210968625b0ed35946
SHA16bf24b551b966658c1d78be15d8f5df96c9b570a
SHA2562f1591d757d0a0e3da5133a95b5658ff0ce85ea8bac81feded37ad58a5cf5e63
SHA512a30bc6ea110b10f92d6f864f6d15d961570692990ac536f168525a240c838fd775fe1696c5fd3deeda6aca2ace1a93cd31d499dcadaf33535bebbd51170268d3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a