Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
General
-
Target
sample.html
-
Size
220KB
-
MD5
4b7885b0e05038e1bf8700f4af0e221e
-
SHA1
3d3f1a5ccc628ab205a2f1ec61d8bcd288ffa48f
-
SHA256
3f837afc090109d2f908c8dbc3e81b686a52d7c4d4bb9cc2fb8ae178301cda6e
-
SHA512
e4e1599b46622289997a55cd739c8fc9b585100f5b4f1afc3ffb0cd6aef0b4f5322570139358824bf8e9850415423bcb81d6b1a134a3c8cd1209a9454b6cd2f5
-
SSDEEP
3072:SPGEVLA+gJbDyyfkMY+BES09JXAnyrZalI+YQ:SPpHsTsMYod+X3oI+YQ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422532960" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F01937A1-181F-11EF-8745-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2240 iexplore.exe 2240 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2240 wrote to memory of 2036 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 2036 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 2036 2240 iexplore.exe IEXPLORE.EXE PID 2240 wrote to memory of 2036 2240 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fadc5f014071d496f224ead68b75883b
SHA1c7f4d371b91eea147ac08dcbb015f653c576e4d0
SHA256f2b6a42f5a44e5ad130add779e7b9a317a064d370ed792f89257867468b9707e
SHA512390fedba867a9b1bb187d10eca0af063b2d02015e310fc57fe563ddd3c06e741e2c9746ec2f256f6fffb0e604378d64042b4fa01c7983a36e86710da3866c6ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524f66ba7a3f348336c088b7ed1f3c145
SHA1da28d15f2a5a3b7be0d0cdf0c75184506126dec0
SHA25689a91d9df136cbdecb8fc3acd12a263566e2c6d80ac7ea45cc8ceeea6b9535d4
SHA5129f3bd2ff54b3e83a226b1ecba5358989b592259e23e864b9d1972ca16d6f37d037b797c91696bf5e88caabea13d2672742c373e0b2a183ffb7c21df704d7e4e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa2c6d43e6571b49d0bfd167875eb18d
SHA1585d1fd3fac86ef6e2873f8fd985a1893ad9e210
SHA2562e31721c14574175e2ee841fb439ae1188eb79fd0f74ab2f9ffb8fee91b1c6f4
SHA512ecd2f6be8c950ce7cf606773103e7f5170effea8773dc5c65e0c5db1400c8c4305fd1dd1028e9f26f6aca9dbb135abf7c70f8751107cb7ee596fc4f6697306fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594697aede8425d388c376adc512dfce0
SHA19c7928b9b136f284ac9a7c4fe19d5c305f4237b2
SHA2566acda916d0d0f9bb9d7e186da1cc69260d6730d55e77b5ff1abfd7e4d09d7c2b
SHA512ef40ad795a8b4c156eafa077060be1df5da29ee2feee50ac069e5d162efd29704a156d593d24df3d296dd04e4c162db5fb79a3d2c144dc31ae3e346aa8f9bcc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57478e8157ca23ba567dcab3f75eb2030
SHA180cafa179e429a71f534613772c4f5ed9b536ba3
SHA256a62f7abaacf686b5982da286e9c419898b3f90f53ecc9b892ccfb8aed54e4130
SHA512d4298b15f10bbb891df0269d439b2e32138be8e18d23e61d3eaefeef54a08f6f2acd1dbfacc3a5ccfc4fe7d160df3a6ef556f90426ca671a598840975e2c7a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1fc5dc1c280228a7383f05980d1812e
SHA1911f6421a4e070de7ba6e55fdfdfd56132f0338b
SHA256df7b5b08d2a2984265cce3878b59a2a1e0afa1f2fdd53710e2143f5bed33bed5
SHA51293deee7050334b0dc13daab11fe61d4a0bca0e497116c966533817e8f2628f269d5d13c78af34d1aa2c387583c21d2e1b7c4f8b27f9777f296dd4ce5b8f3b4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5028d06fee46c30bffa03042b4dc89ad5
SHA11027ceb843ae50122e20902ff1918e0ba7025dce
SHA256f863666d7c5a5c28881733ba4c48798afdb33a52452e2e361b3adf52150b5f89
SHA5122e3f9fc7997b50df66e92f195f969ae7f76421cbe2bcbf835ea89e588ca618cc88e80a2f4c7d45e80d42e54eadbcc82f3a86fe72c9a78384cc2b1aa6e01e37e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a20d2ac1d88c7d1cbdb2cf00442b2ce
SHA19ce488aa38db5e3ac63c2c873c17d35d1d2ac188
SHA2561b71e5b448752a6cb559187054719e0d3bc359a5ba90fcd1bff653a3d36e4ab0
SHA512f6957b6b78b5f98548ca8246877e1b8861ee2c6461f37d240388773c0cf1ce7bb2306ff027211e25a0be0a73c727d72a23922cb6d513ee968624ee9440fd0895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ff2f76be1f88eac338c174da209231b
SHA16e89b520130922c687acb7602723d9361da72bdd
SHA2563c1b0f2ca5e917228b9382d7eded5eb18722c523a34a2bca6fe4f1181e9327d9
SHA51257c6b13ce6a6e93b8c8b87da3df865c7489db447dde011ab8e274a3d6111a6809939a460d73d14b21faa9e12a14f92bb263483d388cf28824b776543c9773639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5800dbb3d860e11cd1d63b87eadcba7df
SHA143bae2f8d8515bd5aba69f04df191e785e2193e5
SHA2563242dd3918607097d6afe422b9afd9631c319c87c03b554d6758760b2d150c47
SHA512143d52faf843a74f4291857643994dc32cd4cd2549892bb63c0c8e3bd24cc8251424baac3cc1c201276b76fa8fe23a2081866e0f528df4aedffe7f45ea0b4c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffa1bba41eb6a0587b2bf7b0c130f5fe
SHA11a8d1ff51b7b0a63df20d039e3724e54f6e3fe0b
SHA2567cbe45ded9a010f5e0d4dcf283bee5a3dd9bd2c34a08931ab230cac6e8bf58d3
SHA5125cc5d942f4cac6022c10174196046a60dfb8b5d0d9ee1292ba29c77943b006790d0074c995be7a8ae138f9e8d46249e9803e8e1c6b323cd75cab64347f4e7177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5516fe5b3c4a77efa1f2ba88fb0728606
SHA18b44336d734470e24be2a60ec65518e53c2e93eb
SHA256c577dd5042e1d29f4907d44822540ee8f43593e52f88e5dc564ef3ad33a28a7a
SHA51212f5d8662cd8715be78aeb84030776abdb19ac9b9f06bbd1e26f6ab3e12d311ab07e61e9d15e5568391ff41bc5ed321cc121cfef1307e9ac5b9742cc0dcef26d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50959dcb1c5aab8e5293861fbf5b6eb80
SHA1570de3f3197df5cfb02b0b5bacd09cfa6861c17d
SHA256f22a01b04cfb36bca603fae3413f3f1bbdb9f4964a656ea2f035af466550522c
SHA512e4c7afd9d0db2eaf3b0ccff0aea5a60a0497d6fe0f5c734ad34108a4fedd66258df3a6bc994840d25f091a7fc9eb466a9f172c82770639f4d47e938fb3919960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecf3cb27bfdad8fa6a8d76ac80f9bbc1
SHA159c5a01a218de6acd45e2ee5552f654d6b90a7e1
SHA25651f0c2df2efcb27ef703496b335eb0bb8d00809909f57af7b61aac6e46b3749b
SHA51267830051afbb6920cd5cf81b01b23e4afc86476c3c6751392370b89c52c7f9fa72bb17f2ac5f26a83fe726626830705924a413ca4b0e689e9c98729261a6a5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a95176c76dd5b1c7cae640072d6311c4
SHA13ae91490ba478e9d095ee3967728b93a5465eb48
SHA25678c81ae4422c5f0bbf90a19848b8d3c7f47b65e248f43ab5b24d7daa9ab11de5
SHA512e9c8005da957d1d9b85493663bbc02b9748619fbb8486c12d0de5cc05606e0cf4de8103a81f2aba03d6a88db9eacc5c086b9dbe1df3cac93eecf30f6b3fc4b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab57108e7a5b93cd551c1d40b1ac9130
SHA14d33e424e75c6ca3f49edfb68f1e9d6aacad46a7
SHA256b7ad73d1e5b02a85d06fc8185d8f830fd1d0a177b3728783632b4efa49faf3f9
SHA5128c3691632c8b13bb32d25204a6b17cb925c715de5766bf6cb0f0938b3be076924ec1ababa70afd65318f4c7ecc4dabd65ad747469bc2e503cf196481fdb2150f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560f2b10e9dd7a40aa60b13d5c4fbdb8c
SHA1752f127529f6f12cdb8eb64df66159dfddec387d
SHA256b1933618f900ab7283f4b1c90960df780282c9b76f7556348ef4043747becfda
SHA512195a8f595b9ebbfbcc57ac8f099155028d5cddc8e6623e2073b805caf54ae226d3475f929a1727144f7bace0666144baaacced34e6629b0980c5e3f0474471df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a141775a92516f8faa496d39bea37c3
SHA1c3fc425c9a6635413abc5aebab28de2d02efae27
SHA256ab058e1694b1127257fe03f9898b2fc01684a67a9f6fe96c7d4f5fc73c89ad4a
SHA5123b24efd183350037105b9ad9f09f7f39ae98bec865d56030c643c685be0cd9ecf1f2f2a978239185b0b3df5107d126a6300e06277bab72386ad5290a2eb377a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56b8e58354eb28d964a8f8148a8a3d2d4
SHA169cbe8cb44c67512742defe10c7dac3edb168325
SHA2560e95b00fda061ba4043a716927ab42f8cbf7547bf7b9cc4e13083b3ade886e37
SHA512e0d62dece638fab84a8bf1c1fbc0cf966db77877044afedb8b87e711a2148d756ee8f93de9c0bab173f06e7d0f9414f2bee630ca0bdf2ad1581c1520e4b9fa00
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a