Analysis
-
max time kernel
245s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240508-en
General
-
Target
.html
-
Size
751B
-
MD5
6d6069a6adf3e607911a4da8841d450b
-
SHA1
4f1e90d8733a46942884a14f7663bec9f4cd2ea7
-
SHA256
2896e1ebe90347a650c2ea28f23bb6818795d53a49adb7f746c6dbeb8fed1916
-
SHA512
df1d0be59814c438afdffe4a167e296a03bef0661f51945538d9013a5b17815a1baef798df502332e520ac0dfe092c7b04840c3bdf44b39cc0d11d5c82669e77
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422482815" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2E339E61-17AB-11EF-97FB-6A55B5C6A64E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1000bb03b8abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e1155df4f1741e4997959d2193cffaef0000000002000000000010660000000100002000000059e89ac4dc5c8ea41e4eedd0732a4a46f9e9567f73a29fb22068b7b293fb8df4000000000e8000000002000020000000f974d13494375a0652d353d59509c13d7ec1b67d0b0ace6325e65450f411ac9d20000000913482a6103c65a3f7d5259d834ce6012482766219c74a86ab6d417638319e74400000000a88a0610016feb1b2a2c5e6d1fa8d275a50552fac99611489331d76f56b41b53502fb96386352fb0c652067889c6235d3a55e3b01c246da8c4d1f82b400c708 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Modifies registry class 5 IoCs
Processes:
IEXPLORE.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList\WINWORD.EXE IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WINWORD.EXE IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2648 iexplore.exe 2648 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2648 wrote to memory of 3000 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 3000 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 3000 2648 iexplore.exe IEXPLORE.EXE PID 2648 wrote to memory of 3000 2648 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5141f21c581d7a7ea097296d3678025ca
SHA184dcd1ccb3d5de49eb78a2bc5128a47c6d88fb26
SHA2567b5ef54f29a99aefd20d32f98423455e598197ee100786cf9e417262d705086d
SHA512ead3a0bb360bf021ec53c32ffd86dfdd474100bf1b507d9bf6367b3904d8bdc76b812cc2a705a584ad7e8314f3929bbf2d25eec3dadcaa970cb41057767d37f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58556a5965bc75e764447ecaf712e03e1
SHA111c271e5f3251a27168937cbc03ff5f9b2db0e5c
SHA25639fd82e3af58643cdda7b1dbcf311e5727f03d4b5ee4d60001041a95876294a2
SHA5123cab5afcfd51a2a3bcef6696f162a3c6936d8320326a63732b735ce4a8a78aefb273dbb62b1682c25327ef590d08a641f02ee57a249c769a05129cd6c6b837b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ee8f07d17e8f92e930f5542208412c1
SHA1faaddf7bb2e1ae5fd5a6028a50a866fb23faf48b
SHA2563400902c2cb9fa683f493c882ce75ed95b6b05f663a85e4d88aa1c4eb749ea04
SHA5121bcd97908aa197ac47721f1a21c51f56517f0092b0d25129f56da39d857614af29b536d1fb1d019c4dc3188850d475716b01bc576a597fa2d3364299d331fe31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b674dc13e63aa94ce083ea74c5b1dbf
SHA1d120589739a56aaf39179b9daff09da693e5d7c5
SHA256283d5317fadf2034b8ee0f0411bfb7096ca0cf696d764c624f6bcaa86b7bcab5
SHA5121d0c35fd2e82fc6965e9fba19f9e321342d7aae28741aa2ccf8488e2104589edd4ce968ab43acf00822e54315aeaa10a92dcc86c93aaef41dc09447246abe95f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea106b0dec452ac60bc7afa6a48002f4
SHA1ad466a1a78b104d98002de1eeb506ff8054051af
SHA25604b1fe9d7a5bde89447464d7539518eda9e1e00da48d26c548768ee2dbb9ce93
SHA512516f69bc0c7529b0def659a520c45242906c1aad28fe148be67aab0e9a93928ab9aac02ab44d3a4f935c9452ccada1ae9be8bcb856fe17d2527c757bf1414480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5473268dd0853b813d8c616c9b921af62
SHA1164af7b2ec6672c24a365f4f5088d268c0c17121
SHA2569d88abb192eac0275ea477a81405aeb5373e6a5333da7256943eb2398e78211f
SHA51294db7dd7210d82db0c17425c9fc83ea563d25d36fd74304f1b0660749b43763a0699501ec5116b9f05b920c83924d692a8f8918885a63ce0eae2019fa53ef09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5b49a1e4fea820a52fe18b7e19c58f7
SHA1fd2f84375a7dedfd16d75729eb197dbe46926334
SHA256bda559b21b59e458c97a59184e4cd8531f58a9b515a9d8c93f05f93ff8ab143b
SHA512e0498a74c7c79d8c86870a599747d5c54e8d98e16df8a17280b7f4111c899247a0ae77f8af8df8bb8202ece9b8b266e95392a2753dae02eda33c5b85396804a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e87786eb48fd1afa87fac6a5a9d91b9
SHA192766f40eb2f5276f68d526aaa4f17eaad5da9a4
SHA2569bf54be2162dc55cdd4bc79771cd69c9e9c3069644ef2ed265a36bec33c4eba1
SHA512094ebaac559b50dac4cd8d48588db200ca78855fa04775314d48fd3ddba92293b4611e7988b0d64a9741d862c33539cb5bbed4fb5a0807c9cf903a19344d6014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b7486a9fed544fb33d31419f64e04cd
SHA17581a27e133d39496375b307de80c1d4934fb660
SHA256818efc07aa7abecff5ad27916e24e765e338a8f390a70adae0e3945176d59f06
SHA5126c3930ab02cfc1931ff4078bac7c266e14d43d8c397f65b9c4400b862d423b59e679ddb559d09b905c66297460aeb10356a96e6c375a33ea916adc0bf2c50c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9004f7a563e745dbe70e5e05e25e636
SHA109ecfc84ba42209e77a5b0ffca44a2e21da65bae
SHA25677f9c9e3c6d3bd6f99b9563b13a482ffa8f869f10dcce7261503bffb3381b415
SHA5127136237d75f5f0c871b4b45e7a59abe385a889deb28cf8fde5b213acbb6661e4f725a134c6ab151b19d91906d437dec81052f825f714f22177bd053bea936995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592af0027cc77536a317cce8d513e0414
SHA15e613854b060bae8d3003e8d1e345f73c39ff195
SHA256238fdc3951ee10ac8d04a161c31dc37604b70c09ebbd2318ed0258a796d65999
SHA5128e95b234be115e8b7b8e3bfe512dfebc115e6c3ec991a14ea9deb1a8fd25d758e79c2b1ce2d198f6488e702206436a3999b218e2956b5d337237ea9581b27bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ebe8097da887dedf71dd830a65dea69
SHA1ba85d7bb5a283906307c357d968303f8e63f03e3
SHA25653551b261e3cf23d098b6a489a0e877c43d4882c645418a0b5cd7041bc78544c
SHA512bdca684d012e67044b9b83d6caec7f4eeed8d88918e3d22e16bea39acae610e8b2583824bc9580c979e591eb6e0d24896d5f1ef681d0b5d916368d3a45e43fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572bd8734b8f70bbc31326a3710ff3404
SHA1db9155acefc9e0205af3413bf9d5ceaae24dbb40
SHA25696c626a459a24cb1185242f1ec36e589775af6f2d4e31cff239e19e1e1d3f06a
SHA51296e3376fa6b19cf0ceccda867f4b178b08a0d8a2b4ee4076c1eaa6ecd83b7f089abb643c93fa1d9652d5ee67f186f74ec720ce368378fd6af2d22c9fd9bfb76b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506ec7031c7c405c897254cffdd58d7cf
SHA18678847490f0a9870f7a471e7f1f2eada1ff1c47
SHA2567c120db586c74931db96f1f4b0b39168a7c5e8ccb1e2086625144fbc9523a337
SHA5124ed235c7773cda51516701a9ae0d672422a3e82353e9b66a7ceb2556376c983f96d9b2d11ea9b85eae855a54511f92fde9068f41420312bdd699e43693f450ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5853f4a9fe9a1797479f8fee0765215e5
SHA100cdcfd709e6c9d34ea6177cebccf0ec2b9ac06d
SHA2561460c9a879ec1933f91f6eba857a9661e402978c8e8bdafd1e7e599518d21060
SHA51232f0e8f11fd9f43243400790b00dac391294dfa531361fbe33ed4c1482b31f6161a80240d54554ef4bfcd086bd54f678745621b8e5c50c44cd47696efbbd63f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5347d7253c41542a12f3ae21a56e10806
SHA1d94bdbd416b0a704891ab540fa4f8d60a60eef3b
SHA256d8afcd7d79393dd624876b779437121d17b7c482a69574edea3a4f8857122db9
SHA512469a4614981df082237b40bef9b85cb2fa0e7cf7476fa3f9f30b1302d90d8c915300e77a65337b2ea0888831615dcc90a1d008c20ce9fa6ed062c17262298c30
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a