Analysis
-
max time kernel
196s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
api.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
api.html
Resource
win10v2004-20240426-en
General
-
Target
api.html
-
Size
4KB
-
MD5
59ce9872d1fa3722be55e4b90c260de5
-
SHA1
1e3601015985ec73389a2617c51f20effed4be23
-
SHA256
4e8aa01b50284411ee13e3816036fb7c346c96ca720d2572615f1e1310eaee22
-
SHA512
2a5c8e09fad5211f75edf4b2a572991c51dd1d40a84bfc69dc8cb8327c55372003bd83f4eb90676167b2c18c7c61619f4a2ce175e896ffc0bceeae297bfd6a07
-
SSDEEP
96:1j9jwIjYj5jDK/D5DMF+C8JZqXKHvpIkdNPrR+9PaQxJbGD:1j9jhjYj9K/Vo+naaHvFdNPro9ieJGD
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422469821" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EDC798E1-178C-11EF-A336-7EEA931DE775} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d649a6b39af3294daabc253289aa266800000000020000000000106600000001000020000000a6c131df017fc0e5c653a7f97f40a808f436bfdcc33fa157656ffbe8bd553c52000000000e80000000020000200000001aa151fd9ace14ebf09f903a1795f9b8be2ca89acb88dde5d14eab7320c39b0c20000000a83a2080cb3b0b1b0ca5a8f2b5aac1d13c14fcf1f4d0a1e12474bdca64b4af3340000000010162f0e45d0cd54756163f55a165196cec72ce60780088a34cc76e199bab745a549f8d92f7d2815bf141e578d1df013513c8df4e2a3a8dc8dd50f6294df79f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805ea6c299abda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2216 iexplore.exe 2216 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2216 wrote to memory of 2052 2216 iexplore.exe IEXPLORE.EXE PID 2216 wrote to memory of 2052 2216 iexplore.exe IEXPLORE.EXE PID 2216 wrote to memory of 2052 2216 iexplore.exe IEXPLORE.EXE PID 2216 wrote to memory of 2052 2216 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\api.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5800c575d7777661e238a37e824460825
SHA1c6657c7fecc15328c70731fbafcbe16e8e30f439
SHA2561ac6ef41f90f682f192d1396fc2b4490245cb17b7ee86fa237ed373f358dac2f
SHA512a7832e8e2d957358b8a6129ca8801f5936eb0d4408ae742b6ece785c35ad9cedb4ea75576fe43eb88441d608b5bc2591a1097e721742149cf41a312b988c41f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ed0d372516a0a34aab2750a0767f237
SHA140b190b8979e956d558296c430d0bad5c1c758e6
SHA256cb1e80d4cfced5406329f02d993fe6ccd5ea8e05de2583e3192b22d50f49e8f2
SHA512411de65ed682f6f492ae90a10581c74498de9ebc427410e042783aefb3130d26d0a742d5a5cb60c9181df7460fd957f50a5ffe0680c2b0ef28641e1c3e202cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db82a9de1f267e41826683dc3d4db312
SHA18c1115b252f2d25ecfa0723e8b775c0f2dbf9598
SHA25672d30c31301a11354f0755b5b5aeb75eaeaaa9e2fa3316c783bfbc5984c57f89
SHA512b0c0adf276523247ebac782bb6cc1cdb84052a2e5a16f849a9f14a446a33cee7a23468103a87cd38dd68f23729c1867b48aeb70aa0b3084aa5d3a75692c01f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59dd67051b06430311dd75e18cf05a2df
SHA1673728f5e69eaa6beb47f5eee570e6cd589e515c
SHA256fa594025e34868afd9d68e3c491f8a57c0a20cc156b5977e5a46985cd29b5780
SHA5120a9538ddd97e7fbbc86324ae8e9e6e015d6bcb7c12715d498404eb51ac2f82c46af5be4e0a71cb2abd9dbb2e7bc33e9216faedbd45b6bd0843ec9af67d7d8dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b85976289632af72a6a1c6ff6d5d6f4
SHA1b44833615752c33f477c271e2d9647e5bf443b84
SHA256a99434e8689ef2e2f9b9fcc13a803a3b6de61f0a69dda99006578b22e82946b5
SHA512c1c8a95e7e8ba60b4c2575be3ae83e92e1227a7c5e5b15daeb89a3c1add3ab5b7b511e214c2f2004aa54b59333a3ac882e867566722a0a11acc33fd5defbd0c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5905eabcc1621171027fad934ebf258
SHA11b62de29cf2aea95610c1747c2a8f89bc0f9bbe6
SHA25658a89ea49ef98ccbfc35c96aa89f9749fb934be4460cce6bf31b5c872f88812a
SHA512c4b19a5476d248a374efc34cea8f7e63c0644b4e9282632b1443b60f7fe49c926c3f4ed7fda70df2408e646abb5062a970bbfd7ab790428f5104004de97fba5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e1e3c6b4e2bea1a37aa2f021564889f
SHA19aeec5035cd7424cace985cc7419cd8ddd38f46b
SHA25688a3b7089bc14658e8cf70ab22d82c0e092a08891cd2bcc224f78781350d1162
SHA51213ec4e78c2e04b03ce216637e73fdf2aba4ed92f82fd07c3f57354b26cf80d4e9c07e421c07b9f0c9f90666a342df926fbdbea0615c943086d33a6e9c3ced9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571ad8c5e990eb2b62b812faf3bfe0f40
SHA1325f03ce1b1d468113eab8e2696d6025a2192697
SHA2560ce9a40ec8bfedee1e7018ada38c9282e5f644d58a82c7fbab3665d389c219d0
SHA5124379cfec039fe3873f0b12e1d0db56c71264a0c59975e25d102d868d72cb37e0cfade651b75b4861816a4f907c8e1c8d1df12097dfb70ac6b00a74e30e1207c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512b11abcccd6908bca6e9c6dc1229edb
SHA1af106043517cd38f0fd14e70f91526bceb76229e
SHA2562993ae01cb4702820fba9e475cf52ed203bf723c065b177c90463f3486ab47df
SHA512037416face46de1958c9af714e2d03f0c0cf2d8d1b8db56299527b68a5b95b390feccfe36ab96437db62ff1ee15ac2b88f1f6fde8eb028daf76e667acff5ead1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2b8fe5995dc6e065f9be78258c39a25
SHA17ca49ce2a7386933de0e06e2325d327ed49370a0
SHA256642ba7a73ad8b0eff7dcdd6b4b7a6f710bbcd685c83da769442e732c65df4cfd
SHA512ea85ed169edb0da155f5f0b423fdef1131a085102b51427706dc250e081db4ff2d363706bd7c2ccafcec74afa79a45e238fda0b9a9e42d2957c98083a647b0f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a4ec90d4090d05f5aa7fbbcc09db441
SHA1b929986448f271d3e3c5ed535ff9090b267a28f3
SHA256285af951737278692a59d4440725346c768b6a6552a16ad4377b8dcbc9cc4a85
SHA512db6b12007b47288a061d17a79c5c113317eb8f054bd5fa70a410e83c31245716b861ec207d47e1f323334f891f26c7a5d205ed23a424aa335cc06f29ae395f68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c4235c656ed21897991d0a411db202b
SHA16fa7280fb383dbf0b3ffbd07f4bddebff37f4b0f
SHA256822a3ab63c166b6bc7cf7913b7cdabdde75d89f2932edff4f3038a12d7c2c9da
SHA512da2348ac59e820d89388d78ddca7b0a2e18ad2882c14c62292b9bc36f129ab04ebe7d30373ef0a77109912c139a8373a030d615198dd2ecc19f1632c1c9f1956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c0b2b63772697520e7409aec06a9062
SHA17917a949f52d80aae65113551da5007cf9a36634
SHA256e4078ac80ffe66b377b72753255042a8062057b273c110354e320b04b49dedab
SHA5121d460e336bd428e5be453f372b2b7f81c842f91840d48ba998cc3215699fa2970e4b3a7f028bc88e4e391dad0d529acf4fc24400b092c1f27286c1b7e86dc47b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567deb9e7b43a07e70be2454aa4715858
SHA1ff77ecff010b3ad98b0927b7cb9833e2dbc8e455
SHA2566a17f91a6506e43399be989d834f81bb63906ff532836048ad493390c14e6db0
SHA51215448327626f8283e0a643ef9f71cf0936ae477bd9f59cd66ed6f74c7a3e7f870647df3c148c69dc450799567505f10dc31689b4437f46e41cd97e8fc50f52b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7cbd1d8e8cae437d670a9aa026295d8
SHA1ef2dda300e18a4666eef873f16af3976aba2e1a0
SHA2561b95382a885ec732caf010271b24b758ba63d529eec3d3b9d6408d3f3bb5371b
SHA5122f042d6d560d861af388bb982b29a07756226bf594a882c5758692990ff3d11253f18efee12c13be8e8980f22ba2f03b1706c86170f744349088c70895e399b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5b1ce2d087fa16303ed266d6b1a4eef
SHA1ee0507d55eaa804e92025e77affd2898f2c9185d
SHA256c3b5f6847f7aaed8497a9dca3f8105c14601263bfc6f28e6c806643d51afa70e
SHA51293878539f2dea78efad2a745847627ab338f4e2670ac76ecc95d714d5db4be570a949b5ca2d6e549bf0f2ce6d1bce78e6c7e3b387c8cd11876aed5ba85af9319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5150b55554d0ae82c778ac640853ec6c2
SHA189576f86ab0a6ded0219ce92607ba2019ae34dd6
SHA25610ffb51d38e64e3520fd317420761122835df39f2cd94e60e7b675867e2f3618
SHA512ceaa3cbda87de43ec38e62d1efdde06c1171337c54aa83134e6ccb8d49e2f813f9c09be324fa6cefe4dbcf5ca327eaa63bee1fb11c82580b67b5d33d5ed8521e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d46ca8fead43761b8fd796a6a93b7a3d
SHA11d2db722cfb38c4bcc7b53064e99ca380c070e0f
SHA256add1a454ad43dcd2bcd3834cf883f9b18cae3f4a97040341157b16d202aae4d6
SHA512cc5af12226f36080175c24ac3595b5e4709117cc5a118dd84c09e0650feb5df50e9256930943b967f1b7bdf299bf94da58c1a66e9011acaca09ed0579756b3bd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a