Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:08
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
213KB
-
MD5
d433594e6d2b2f1886f2d8d1ac7e34e9
-
SHA1
e8a0b8a4536edb675775cc8441cc7af67f3dfcbd
-
SHA256
a8fafc38a80cf3c9ee39ba1c024021ce86252b6c1658cc8f4741871d66c6170c
-
SHA512
0a202eb5eec94c24711293ddae8ad196c3c6eb68972e411dff978d98c1e3f205d5c666e6dc9a4785c85b36b4e333134f4ce2a58c5c1cdf0a0624eae5dccdb0ab
-
SSDEEP
3072:SPG0e2KkSsxByfkMY+BES09JXAnyrZalI+YQ:SPtr/EsMYod+X3oI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8503EFF1-17E8-11EF-9DC0-D20227E6D795} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422509158" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1888 iexplore.exe 1888 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1888 wrote to memory of 2380 1888 iexplore.exe IEXPLORE.EXE PID 1888 wrote to memory of 2380 1888 iexplore.exe IEXPLORE.EXE PID 1888 wrote to memory of 2380 1888 iexplore.exe IEXPLORE.EXE PID 1888 wrote to memory of 2380 1888 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4bba564801c0e8d6981ed6e22e40c07
SHA14fa77685dc72e4ec8b9c79eb613cb0598f3af88d
SHA25623af0b17c134910bcbfa3ae14702f64b42be0b78faac72d727efd7600e36d3fa
SHA5122354eb3a570ee8d05a32c8bea960a5d204d5df28cfda21482d4ac437e82688730827dccf09863388307af44db11bdd24cd67d0757563588b2512dfa3cb389843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b3ccff7a4dd3fabb0c98713dbd70165
SHA16f6c9491cd04f38c06cb27fc9fbadaf2e4b67557
SHA25610881c0c1a6dee6cc96c19011bea8e4f1fc51d909368ce13572a1514f42b968f
SHA51225f2bc116065bab877f9748ea617a3682970b90d68b835e97d2857acc6e8e43fc145d083826ff3a45609b3b6ced043dd5d5360e09d948eb59d2d7cadbc965f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561ae39ae78349b32be820b6e09e68320
SHA118f8aead86a780d1caf0c1ee08e6f77b0be60fd1
SHA25699995fe1bf09795568bdeaf1b69431f1cd92bc0798206f4d90f920f747d29b00
SHA51220eee912e7164a68b37eb5efd7a173713f5e660cf870c6cb2eec5ed02999886882ebf075ce575eb86e4783a4ed68c408a4c733d94fe78e32452ef2cd0b38299c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea175c2e4f63c0b7fc4736e3b8c1e741
SHA1c1500f30d82bee07065b9a6508d420bec1af4b39
SHA2560fb21154cd3218d9cd3002608f8f9961b218f69a60c007e6d064d1c6d3ed24fc
SHA512390cf297edc95363cf13076676b65c2348275bbdf8c764cf4a86e2b5bacfde019a667c95e87a11775adb68622d4cb00f63d1228e29b5a0114f00e01674cc1103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a8d8c0851698b88c60deb5a5f9540c7
SHA193c06bc6b5dc7d639f262351354b360e3cea6d49
SHA2560bf22c0227d9a0f38c1a12f26a2dec7735296c850f3b2e4cfe4c919459776958
SHA5123131b35d9e40d7286a842fb008d54d881d303a1fdb42097a97dd27ead9f3c016551719c4fbd2e5abae9462d42ff0a94a4af373b252efe86d4174314e32dcf922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591f4b50833dc8b776f6932fd31725136
SHA12d46961dcac0e67f893b88d89a9534119ce784c3
SHA25680eb3fbb243a9f70832d7e6ee18491f5ecf2f18e91306b85f5af2fe17d319d95
SHA5127ffbed072635aa4026be679db8e1869d533e99b280db2648f9ec02272e59dba6721e010f4d16a70c242594593cf9554ac603286629bbef1fb4a9a67e7757a6e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f539e8ca102dbe249c4914fd568ded30
SHA1a168aae4391a2438bb6820506e38fa06c7caf492
SHA25606a79f363d3cae19627dcb251b7df5f005c4da2950c5141307906c05f3b595d8
SHA512c03e6c378d37fec18ae5cefbe4381dafcf0ed21eb87c3d76e2982a0434aa2153012e0fbe5a1833d72aa50e1791e39d627f6c895f3f8062b904a36185324d1f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faa5a02d9d5fbde735231a5bf2ee13d8
SHA13d35a91c051a80dc3414c66299fc9425663ed59a
SHA256197e062b33031ae2c4e4029ee15bbae89eb5e88588563f1ef9789e41f42c0b81
SHA512f03fc2963a37cf6589e88d96b503fb167d98075cf6037e670cf5fcfebde3e6d892c3240274ee585088c6eadf5e50265a3b41c467e6b3e74a05221143d970cf75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ee95fd57ef2bdddf664072a68522e11
SHA136a802345825f17f4119d1af02382c2aa88a9ea8
SHA2565d08733c1c203f1d5f4ce03a6707ad4a81b02ca37d385e0720693ebea236d3e1
SHA512e00c67a2a42c29f2d70aa64c6c98f8f7756db50ec8f2534b42213c983bf7d91d18f8cc25fcfb564b8a69cdad2f8d139dee1ad28e62d03941a5c0e81f35aa5bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ab7da87c46ddba1ad64c5e9438e6941
SHA185e9c59d385d9cca68abc2fdd9e783b718811e0b
SHA25653461197e337612410ff02c7f2f578445fb8a31c6530d439f7d0b87e20175a35
SHA512bbd611d70d58f6851ac31c83452a58f238b1fe2a31fc66cee1f8057d90c06abcf11b7a0693313cf877e58e33c69480037f646739deba09f9cbdee53e6bb58e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5329140e6c9e196db48a3359f064bf6ea
SHA16bd297212eb41399fd09f19a76274758007ddb3f
SHA256f873f51498f66ed3d05f33462f09edd8963f4a1515545d5ba2dd91144ab0efb2
SHA5128fdf4d1182ee25fe0fdee9285ecb596a7ad436db943359099825f88d1b31a25d9cfd60bf058fd2378ac48d417fdb089db615a361984ffd04530f869552a9e340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d82e72db529a93b6705144305f407bba
SHA113a54e0895616414a83ec88aa38c7b726e561736
SHA256eb3b87f0bb3d4b3de9e70d7ff6af0dbaa1b5ce365f4a5ded7dc5031befa6b789
SHA5128bbbf1f758a28f184581196314fbd925130e63d59353eb109e7f00da6ed90516d4e275bf219228cbead46dedc7da9ead66c5cdd25ceed9ce43c0a28a4461d8bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568bb64d9f47fbb456a60e4df9b6c81f8
SHA13373c5dd1d26ae084b45dfbefb10cf768fcb771c
SHA25685390110d27f78031b728a5f574497f2e2d54adb56512d4614eafc6239d41f84
SHA5126692b46b3a9dde5e04a96558fc661f44bd5272385b4abe3df98db656c4cd9bbac4551ca7c6fedc96f029a7a6e601c7910c1e4f0310910e242086051a695776d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566a60a010fdd515c1fe854d10b38f3f3
SHA1e3801fb1e15dcff80cf2f1813c3ebfb18ee1ff3b
SHA256d6e32b54c1c66f6be1d303e95b07c87e18eef383861030b978a98119f10466cc
SHA512b416e04879d65a8eb32ae64312fe2692ab37cf07cbd94849e46d0da225e3cf90e36a0407867400dbddb7fac355e0c150e866266cd1a0eda9f11ca9300f30aeae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57aff38188b4d5bc384440bb9368b8bea
SHA1ecad4bc386456555fb0c36dcdace8169e82abcf8
SHA256bba51f121ca42f725877d0403e32abe016da8441c7d8997e0b989add9a437bd1
SHA51220988ecfca7c824d31f1877e4db8a144c2a9556b3f78496be98234ec3dafd024dcced85270358810df53e02327866746e909b8d1ce779a84ec320301c8a8f27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5893ba9fed786820013e18eb62dfd213a
SHA19dfcb489374ce5189dba4e85e2500a4502141bfd
SHA256a27892ad2c9a045f2cf774180993ce8c750b03a2189bdddc4be296f2ec705e20
SHA512013150bae6449f5e3e1a7a602afde2a26c0a119ddf77ac6c033e76f86eede15e2bebe18a779e9e66b50fa3485cf0e584b04882416f467bfc6eef694508e117db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e51640fd2a60431bfc56f6965c0cb887
SHA15b8a6ccc885895614779e2e656989d8c95eb5097
SHA2561209e9278cf6386ec7e4d6ee54db8ec55c711a1006f7345a2720c6c7e15fd35e
SHA51257003f1d3136e8db0e692bac3fc07fa95466f0fd94d8aa8167df90bf66ebc7c196cbaf548799bd7940688e4510049ba21c26256824586d0b0264398abcf422b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525bcc37ca80196183384a77f3f4ef69c
SHA19f16302ff3a8d26e589daf44999964517772b261
SHA256c579c7c9e329985c57aa08e7701d355d1171d567ac8523d94a579145d12d404a
SHA512539240e07197dfd6f59861a2cdc3a22672f71c089a10a10b87571c3a4321e40a2aa77329c4b8a0ba28b5ce8f6d9df90266eace9afc27c7973339f185bcdcb8c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5857d48cf865ccd8c9a0b7b6bcbc27dc8
SHA18c6b930c52891633e78ed96ff2368bd552136bde
SHA2566a7d0409bf94fd5114edac63bbccffc81ecdae80c518f5628c57b4a26d9c44fb
SHA512c7a675b41f3252264587343a7971f95801a41e4f64214f52d9cbc75bcf26859220655177752c160295c25ff450b7057df0cfaee1a40635b62e705e1f24c852e4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a