Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
1c64afa1a4a85eabd3c2fb71f641a000
-
SHA1
0f1f7a6900283b4fa26e5cdb7ace6a5099bbc443
-
SHA256
7590054977fb3d86f9e65ecd5a1ea58f78d7e97ab3f59a3bb172f38d9ca97d61
-
SHA512
9447ff87d79e5bdaa88bc8786c8a5b7bdf5ba148005b2c06206bf418b7d9dfbb845b108be620def8ca98dfe3966a1c51fa9c67841cdbccde36abb4280907302b
-
SSDEEP
3072:ShCAuqXsj+bhiyfkMY+BES09JXAnyrZalI+YQ:ShFTnsMYod+X3oI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9470F1D1-17DA-11EF-85B9-4A8427BA3DB8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422503174" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2368 iexplore.exe 2368 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2368 wrote to memory of 2396 2368 iexplore.exe IEXPLORE.EXE PID 2368 wrote to memory of 2396 2368 iexplore.exe IEXPLORE.EXE PID 2368 wrote to memory of 2396 2368 iexplore.exe IEXPLORE.EXE PID 2368 wrote to memory of 2396 2368 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51326c821f985b3e0a4753d7af5a18820
SHA191aefbd2a6d27925cc584134984d7c63493e3784
SHA2562d5b09e7bded4ff5702c46263432334c000a53cfd7107af42a40a2e523362842
SHA5125769106f16a8a089e9ba3b7018c37f2f3bc3c6d24d0ca0adfde96ab46b6c3eb6f8c8d69a3a3a14844ddb12f7eee801bfcb6530fee8b3432734a0a33312a2a899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519a1376c976f17826fddddfd564fa0b1
SHA123a1bc16ac3f07aa5f248af2a22451b43fbe852e
SHA256e03d7db5face63ea03b47f9d0739ba9e2248cdcffcfeb847499a531ddfeaa456
SHA512a33a13e2109f302348b710435ae137c15b65b2e7072c77f8f2cd4bda3b50c85af71673075525675e7589c9c789ee52a2df1b62e5263ad55822155af1c6df180c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591913d385c11ac971823880444343bbb
SHA192d8b461e638c1222d9765f2091b559a94a2eaaa
SHA256e8d916334bb86d406c984eaef9bd017e5124a20dfc21e3d3f60ba834db21f788
SHA512c8a4919911b3c40c2f8927ac12d5dd4c82d7ef2b7a605e81567f8e149b468c26bf6c426dc97b199ff0757302043342c151caa7fd80817c58a64c40f856e2b33b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5970ccb6778244e622545350cd3f021
SHA18e5f5881bfb4c50c256fdad8fb89db8305c28ec8
SHA256e3c770af477e127044ba9dcd6540770b3426d0778fba393f6cdf9f3056040556
SHA5125612826ed7588c6e0ba2f9bcd358052e8612d9809554dfcba269a97971194c1bc017106978cf59e210a1a03a0d60c79a01fc12d5ff42167cc4be98fe73aa8ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8e3124d2325ef8c2a9d04512ebfe529
SHA1f41c977fb8d9c66b7bd9673df4ccb7d3ee563d06
SHA256eb60a00a25381f0b0e282bf42f103503a5eb602cf767bf2d58d99ee0eda6acae
SHA5128931303740b000595e32e8ad41d8f3dd1a75262549b67441b3497374afd803fcac61a1a2bd65dc1cb4582b40dbc1c464dcb07f95e121b35b543a377fa4bc3b9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5e087593853796e3ba35ff6b840ffa7
SHA184409edc95001d40288108dbaf3290efecb379c4
SHA256585c02d36de10513a2f7ceae9d7f3c89542310858207fb23b514df116393a7d5
SHA5125ac221b788c1a6e9f022a0a52dfde7ff432ed14b429652f1ddc6a114c33479a17e87d8991ad704e659ec824c0186e7c3b167cfa8961dc8aff7cccf6d2194d0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a64ded21a78bab49726911003f3709f9
SHA1998a9402c86ccf85bb229ba71f5b6f76b17b5d96
SHA256af649791379a1dff7d7c7477f5de98d65de35660c03e323281721817a0339298
SHA51284b41c5bf1ede961f7db74e9efbe75738baaa0eea9f058284461c07b183442e29153bd77c795c75385f2350e4aa71dcc76024ccea7416156653160fb491bcfb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585b8e801e5b6e3180794590a0084c19d
SHA1e884144b77d46c893e5b6d8e7d10b417206584a1
SHA256581b0419965a105933e0510786f4a34304fb33f937f1e12a762b84a4cdc6e723
SHA5126ff36770fb41df2ca70810ed58252510950047e7c333ea7e3edef755b797399447a6ef2d46f345766ed037d0ac76a39e867673c2b4e61f9ec5edda114998b6cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55eea6a12a16afdc2ec8a72a2b7d2ef4d
SHA1d98b6bd7ddfd70b6a4ba654aeb67b83a5b227b30
SHA256f2ff86770f3a662e40135f0f6801aaf44e48dad4b26261c2040f673b117baf64
SHA5125ce35a3e7840fa4b591f550d3417325c41d061aa63b47ff74497b1c7c77c792870cc7fdf185869bda7353b7a4f6e4e9f04e8530389b3716058e726ff9f08d964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dce01ea0152ab8179037ba8c18515e19
SHA1848cc47d566977310be1a3439527a913924dcaeb
SHA256139ec3f260b1067c8c6c8ad33316dfd38efeb56be651a2d927c52bc1f711981b
SHA5122b9e1d51531771cc0aa8398171fe4b3ae435183351bd2fdb3bdc9152dc56de0b8e4411f89e5fdd10184ccf9533deaa179546a9e93b7c9a90123202a218394110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594b3c7aaeddf9579aad7ef85b5e52ebf
SHA1ac13881a308de71fddb36ba72ebf6d821e576ce9
SHA256bc5dba52506029d9ac3cedd2e215fad9041cda9be6e20362ea8ab026640363f7
SHA51285cdfcbef61e4acee63e690c8aa6652646e288b359129ca6ed1bc73812471ff33fa8e26f3be3b1b5c7df02c8cfea6659eb0c945caa4f48ab9c1d4422681bc40b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5148212b0c05cc6c9dd253f1e6b9b387a
SHA1966abc308154a559e24baced062558af430fff72
SHA2568628f8a270bfa19492e7a1d3c93e0873bd8f72f6812107c973468f48c0881200
SHA5123aaa06419c4af3803434765ac43def98c767182d50213114c99962c54c49b35ef5b9687bf8adcd9c9c3235348dc65e8de768fba8357d3f58936c050428c35d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5015bde4d22294649e60ae02a74108067
SHA1027e701d5fdaf9be9c11fd4fa5fd561a00f1d4cc
SHA256795d37fdc46e6b172d80bf6af0204d73d5cb0037be4091a3436e1ca8f4ef9543
SHA512a1ce22a8862192cb91636189cbe3d425e1b6bfed11226bbeb0fee79a8095a347b9fc19ca99fcbafcda168979c686865fc2ff15f4b0ee0de6ec339357b7249e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e0ca401f12e01c979679bd3dde7f45c
SHA137c17a5abef95beed9e50e835274f2b57b30568d
SHA256697e3e6ba49ea781e0aff6cc8d09832ddf28a8767cb5fc7d66432a430627c409
SHA51215fb49cf44942742ac2ba88ebc9f9de8d3db99beb0c547f94d4b721d97bf65b6bb66c2a84759d451091c658cb48e02506d29944ae4ca8a9e7b1fea1068130d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d72616debc4ba15a7cc9c7d0cfaa49d2
SHA1eaf0801ee5f3d782240e62dc51fc8fbda67e5ddc
SHA2561d10b41357ea879ea8d5f24433c05d1e7d2c8e504e6f300bea62b1f29bcab209
SHA5121027bd79ae9df25954df13b3936d06e24f69f95af3a3e228b1ab8ae69fc080b1cf487e1130de07eebb4f52fcfdaa59bf6bf8a0fec2848083cda26076a0141ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef1c81838d90a18179e4f16830d6d52b
SHA1b4bd14002c8b309db2c9962a1e88fa2965e1336d
SHA256b2c5a093b38333d1ae6f1ace456f7cba6e2a2ffde61ab2a339b8bf9ab919414f
SHA5128106a665518bf3c600cdcc53f3d35a777c973b82123ea5cc63473b03b666be8330a75bb51fbcda47f03e592a8f255de62d6b829c3ba280af34da123b49ce1dfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9505ca3945ee8c580f5ca2f3cd384ae
SHA1a59de2a5f5c2d92a63f1625b30bbe24fd253b988
SHA2564d915f82ee0e1106c76586040a40bd2fcc6a64dc6b16337f3b14d2e72b3c6584
SHA5124731706a571e0a5f6fbf3ba81e4290bf1b2299f111d9b40edc9d98bc9cf9a8c03b98c9837c56b2e8a0ed95d5925f8c3b95cfaf5cd0552a50cc9c1aae0a88d9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a62c2db32545a032bbc719e3b5bfde0b
SHA1d0c68795b0559501dbb275e2c7f96f469fe8e9c0
SHA2565a02a555303e6d77df7cd3825fa58dbc42cb218f8d13cb30009116f37d0a611c
SHA5128d417363cf78e1b720a3f575d0b7d8653ea34234b4926007aa663175c7f0b257e909414c9062e642393dad617045c688408317b022120e2ac3a1f06dc7a1c8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50916874bc12fb5561731b7b0bf4a61b2
SHA195dad2492f4b11aa1dc85aec90b9eec81981be41
SHA256304268a166cbc3f99a0de2ea1390186ceeb35d28265c2084724bfa151b1b30b2
SHA512865f2ddd3a53909dc1fd7b55e5de15a33d302a7c793ac0c0dd880ad5191064f2fce268b49a58cc4d25f395046e31e6b69b258192c9cdddd6efdb312daf3832af
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a