Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240508-en
General
-
Target
.html
-
Size
4KB
-
MD5
4f7aea1f6fa4fc45e74119a4cb691b31
-
SHA1
aa1d6fad9f67d5247514e78ba36b70c80dbd8c2e
-
SHA256
b49c2070d9482e6082043cadd89ab5ec33e809e345b8a2a24612214d6fca8541
-
SHA512
5afe0a0c03b65cd65263650a26681045c8ed4e06014ccbdf03e1adc3868d6b82353a7487e3ab923304284457033e566cdce168e8aedfe8930c60fcf669c504ef
-
SSDEEP
96:1j9jwIjYj5jDK/D5DMF+C8sZqXKHvpIkdNNOrR+9PaQxJbGD:1j9jhjYj9K/Vo+nRaHvFdNNOro9ieJGD
Malware Config
Signatures
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008ed9433d7c37b04ea8fc26915974096a00000000020000000000106600000001000020000000bc1083e10f2bd94597d53e494354020ca76532e0129e6a19f1c41fb574088843000000000e8000000002000020000000294a3ee9cb3f7e61827f257ce9aa25e6168eb98f615254e4c2d2906536d65033200000006d70edb8a9739073b51fb77eb265e2536a2925fe441421041d820895e4aaafd4400000008bc1b63a6cf00d95b0aff797d0950b86333b3befa644c907361666d87d826856d24e7925d75cbf431fa1c6f531b7d3bba12a9c0e87fbc2c246d46bf993d07355 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F6EEF11-178E-11EF-9C17-5E73522EB9B5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7064ede39aabda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422470306" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1808 iexplore.exe 1808 iexplore.exe 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE 2620 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1808 wrote to memory of 2620 1808 iexplore.exe IEXPLORE.EXE PID 1808 wrote to memory of 2620 1808 iexplore.exe IEXPLORE.EXE PID 1808 wrote to memory of 2620 1808 iexplore.exe IEXPLORE.EXE PID 1808 wrote to memory of 2620 1808 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1808 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53b64aba3c90c0b9bb38de369700fab5d
SHA17016578e22739f4aac35a583ec7e740dcdb922c8
SHA256b4a90d922cd6eb4116481c8e33b03ab8d07bbfcb9f9a9b7149803a4a4e917a7c
SHA5120384b526811f70ed56da12c03a23c90fc157458c354f0973d64ad17cbf416cf7431e4156bc3ba4e7f5f08473dec3d234ca96cdefee8ea4797c2d33b600831394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57ffb6b67a3a11cdadd741c3195c4d66f
SHA17e35f781ed2d2dd8e3087a7ef5bcdcc08724b854
SHA256cfedcede8ba0c29b5810f3d846fb5dd35682d2fa441a070752cea3e86f0a20ff
SHA5121260ff2f9cb8ad41510860ca8e6a12c00d177480dd5b83c14ed8798db1b9d30e5f6fb6ce4b599a7ba09922f09207f5b568b1cd111a515066ca223daa2cceaa4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58bcfa07c058ef1c7e9f1d0e2db946ce2
SHA120e7d2771d3532fca3e95fe86771624b3e931d7d
SHA256f51c8f6cba694ad64ff88532a16c84874f32a8d2e739febfbbe11430ab0d8fdd
SHA512ed39136e1eddd89d156f5bb1d6c16278062e9f7a8290d2a6e09af36dd0db784c6c5317e276a566efd4c5b4c09943cd15cba3f5a284deaa07083d1e854938a44e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d0ca2dfa27bbfc87937ac06e0e29e797
SHA1b46ef336b8b0a39a51f098be6d51cc2d9d139137
SHA256a8f2257dfb0c91a374d71c4ae5fdea14cd14cbadb7f23ba72f9ac9908d216f24
SHA512ada6495612ae1a21e3e0bcd1cae04e42f7150db19b89af1e5684fc101f446c2836b69f3fedb7ce48cb0aa4771ec2a0c4417ce85b1fcf1376c54528bbe828d057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5000c76b8226859a1170e30568de4172c
SHA1542ee25d0f583480db09d16da23869e5ee66ca09
SHA256c56a51cdd6c54dd0f9a547f2a364505cade1b03e4b5cd5e2dba128d1f764fd2e
SHA512dfd54251960817bd7a139e36f8ef88bc9b6328911813a990f9012a00229824824f64fa8801d97ca977dd0da4ae98c2ad35fd8854262903687732e1ac7b2d5fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5804a2b3645f440741283c71eaf813803
SHA1a7f1cd1fb5f6990d2db2a6e6dd98fcf4545100b6
SHA256f0ae4290b2a9d72e62a32f7b33d6fe8cff9737e51c170eb99ecf57abab6c3f6a
SHA5129e0f9e5b267a4c398313d2f10baa03e5514b0b402b8b2ce16228bced44a0298be39f9399512c27ac1ee573622377f84a31657bea86e8be07bb172924409927a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD502db7da9b9f2111fc368129e6490fd90
SHA14f1c1b9cf9273cd5e99d5e2316ac8a42051b92e7
SHA2568c002dd9b486a2c7d31a8bdaf8f4d67179f404b8d79040e66d3c809067e36fe4
SHA512ca565858adb775305cc12ab454eabe20aefbe015d1ac82f3c981d3aef26db2e34cae2bcec4d508addb65cc98e66a3c37921901b85f80fd7405300aa741e8e09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c0cb0b5d7154730a40beb69335476c2e
SHA1e5cd42026a3f984638fb369fb2094d62b6de993d
SHA256c73f50b70901300ab94ce21eb62e6cbaeea59a190d75bde96d3fe44635686faf
SHA5125a75c37ff112a2a1fe03a8fd232a70f86255bfc39149535f16758321d39effdf984a8dcf15e945f72c4ae841c9f28875724fa52e2ed51402df5443dff0643d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5788e970ef0ac9539648cdf77f6a9bc33
SHA1840abf9ff152c37e5d169faf86db073368445158
SHA2560761d071f44cfb059fbddbeabe6c9a8dd7e36289ba16d6dc0b2fd93159dd04b9
SHA512944bac6235c53502d0111a7afa8510fd9befd54906d8beab8e4ed17e9ae83ea43b793432b9ec5c135bb5cfa3d975447789b23f145d3cc75f1d0d11108f155a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD548c2936a22f31b6a5b4fcb832c1e0799
SHA144709aba7f6d90822cf3f3871c139733a5f3f4d6
SHA256d9ad2b08e655251e3e1350378c4d0913b54e653d1e7a236ddd86b60353776317
SHA512b059719f4a4f9d850673f8de694fb587d531085c358c89a3330311927bf77329d6fb012d1648576ab99ed71c558c9dbdc098729d7e98283372224e0a13deb317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55bd77db31e3166e5ae57b86f706bc8fd
SHA19e1ccbc11b769e2fa57dbf3a39bc61554fc8bd05
SHA25697f0a4bdcc954741d06994eb852b892d4015ad5ded71b3d16a2a2c2b62a7241c
SHA5129dcbcebd03202f8cb6b9ef46769134bfd3266c590c8e5816107df447461ebe546b65cddc9fbb934eeb1a5b6857d7a10fda9680d4a28b2b3fbf1c352d28c24df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5252f4be41c14b364671c895937bc6546
SHA1d491b694091a9096e1bf1d5fbef7b66791a71c4a
SHA2563c8d75d76ab5ddbae382c800c20ef15a4d19cde6f409459022665f15162531a3
SHA51267ed315760503de03a9ef128e640e67b9fb0878000dd896d919cd86f3eeb7ab523fccea50ca7f2fc6117680231e0eab5d0e991a6e995b498293c36c113aa6e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5614975f8639e5e9d5dcbe8929353b37a
SHA1455988b5e18b2cee49c77a39a6927d382dcf6d83
SHA2569c398b7db2608c89cf83581abf415c07132657564c4cbe0a151f0e365aa267d9
SHA512d8d87c58233e0df5ba7b0ee30659eb5d33fe5ecb2be9e4f259fe5094b78c820f85cd8cc2fa8a8995c25886c11cb9be2c4d81d6c9ffb73362b03d566c60729c11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f70cd28200f84ec6f8d738dea92c57b0
SHA19a5616a4d723116ef93dc1516b9952337266e3a6
SHA2568134ec624973ba73b38ea19ff443109b5f745b8d269076c12782c82c47e7d1af
SHA5128ea7fc09f2e413fbbcdc5889f368cb247c3516acf29d9b4841c95e4bd69039a9e16c2dd880bcbf5fcfdf4201543be9ed0dd034dc19a95b0a26d408d27ea9b509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f071ca54083dd271518866fbac053644
SHA168e6b090a2cf0789784e879278f7e9fdf3cb16dd
SHA2566a6e3a1f123fe47f128d2d53ae8451601d0f9c1aceeda173265ab61f68fbf7cc
SHA512cb395b90c78bb02e7805fef218a1435ea54409e6f01b2e9b8737dcffdd84bc8dc2eec449174e29609b53aae4c436fa957181f5d0ee8c5636c51315303c12dd99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d86eddc3bb0e19abefa794fd9b4c59af
SHA1e26a559ceab75e26c45a30c27a55bc6b55df1ca6
SHA256084c28d32374eeaf78e972041492850c3bd97ca2a10d5c0da6d3bdb5c461e8f7
SHA512820d6d789d7c57a5882a4344305339bf4b620aab27a7038ee9a79d7fa3f42c0a95b24519dd92cc5c939af54f58014cc948631bf21ac3c45b46bc9b8b2641b30e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD512f797640906161ca42023156b718652
SHA125dacc2ebceb43636529b016957abad3e89a8648
SHA256e83aca0fb14ee3e89b09f842b4920575080b7a38a19187da2613f3fa9b8b9b6e
SHA51218b26bfb5df6c676704e28717bf845269c0de24ea6ebc7932a19a07955365653798285d8605937afe85f3cfb2d432f86deb9bb8c779772a1027c4dc5e39d425a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba73bc8252d8b63a38f619c8531763da
SHA10e2eac3ef7dcf008a4cc7f9b63e8accd3ffa5f3e
SHA2564b482e10db568502c2137a935d8098020d1e1a632951041b2e473dd47a6ee964
SHA5126e15cee4e884ec36fc44bdf02c94a9688b2f3ad961d85611a21781623d1567f4ce6ff062446d951ba222bfea8781852fc672bb72ea8f06bcbf2d273b748b3dce
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a