Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
DpMgrEx.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DpMgrEx.html
Resource
win10v2004-20240508-en
General
-
Target
DpMgrEx.html
-
Size
1KB
-
MD5
15a6dd886656d7d7b77444d595a8c5ac
-
SHA1
dcda8dbc0bcedabdf4a51bcc204b5d47b1f43b99
-
SHA256
726ae58596bd0b36f18086fe90fb527385efc7ec7c79fa2be83088ace8b3f635
-
SHA512
8e21e02450f930e29e87ef13e487e0f738b887cdf4c99cc67e636f60fd7d84f531bd8a559dcdba9460cc066388d7b75b08d0e2abff614d311c50c2f03fa5fdff
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000058b67746e10b8a45a2b196701af9320500000000020000000000106600000001000020000000668f9897106b15577446533013e5493a7e72ed9f1d33f20b51abbf90e0ad808b000000000e8000000002000020000000b18378abcb537daa1d39d7c0a0ac88da2aa4649d748f48f61eed8d844ec30b8320000000ff116bdf7a6b671cd99a7d752d3e87fc6c2a24929b779257337bec050d54cc30400000004a44369c744de8cda771ff638653a6a450d99dd9874f113fc83b4af49a362d36bb499cd85ad2141ebb9c7c8ad328bbf864703f3e5dfc110016f8d6ff7ab5364b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70dbfda640acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422541500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D255E511-1833-11EF-995F-5A791E92BC44} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1544 iexplore.exe 1544 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2724 1544 iexplore.exe 28 PID 1544 wrote to memory of 2724 1544 iexplore.exe 28 PID 1544 wrote to memory of 2724 1544 iexplore.exe 28 PID 1544 wrote to memory of 2724 1544 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\DpMgrEx.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2123fa28922d26d119118e4d8c392da
SHA1368ab42353c8a0e07efa6c612499cbe3bdcfcd6b
SHA2564ef43a386b6eb32a053f0f33128fa5e85c5627119a41a03852c8b8650caa6b9c
SHA512ac3a9d537c88b9970741c21117a503ac888fd7ebb2dcb93d23ed5d891f4a18c6ddc944e81f3e126c60dddd073d8e34962f7e1c8bbbd944126c330fd5713e3593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd31997e92509972da48e9b71775bc75
SHA14e5ce65cabfc1a8b842335f3d9bcf34b6fe56f7b
SHA25678e6a2523e018ef535f7151821f1da85ecb6c5eb541069e160e558de00499338
SHA5129b7e788412996828ecbb851a802dbddb490f6106cf967baa1465127572cf125f7b9b3a9997034df7c7422a9ce03ebcc70d2c420a63100b7a464c060021531368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f18cfb0a247d5093d8233d8a104cc1d
SHA10b3829ad2a2297d56757228fac8ff25859940ab5
SHA25690e7d4333bfff7a2dacdf66d7e0f61ae4a95227c0e1ff2102605d21189e19031
SHA5125b11a166949738e2fac4358d9bb7abbf8c5512f27a39df4bcd893638284b579bfb8bd44f88de5126b12a15dc05e1103e9b898701d33824118ffa5682250260ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a1ad1da7d19992aaac5bb17dce9255f
SHA140f6fe170a3f88a2a1f0482109bab58a60f21609
SHA25613aa3261fbfa9df5556cfd5387e47784d2bc0df954e5a85459949d74c14b9b02
SHA5125f685bab68ab786550c86c2e425079f97994d3d6956159df7cc4b5223cc81936a68d135610e876505a0a0d530502e88eaf8438aabfd014f45fb595443c018974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5343c0514afa6398cbefd493ebb6368ff
SHA10cc0f86bc2551666acfe5dd78c9af9aebdd77cbb
SHA2568200c87928667ecab722c6ca0c23e0ca08460692774adad018d572d7223c1982
SHA512e8c9977adeae1dcd505456c2c4a0620fb68062c14bebfce743d4968c3da25b65487e7af03f82437071341728d1d14eaad154079d9e06e956012f1aa98535a04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599b6ea2510cb2e98b95a2e39dfb287ae
SHA14d62cb1618f5aae21c11fa5af6a4761003b91f35
SHA2566e1bb9d4c1d0d9c9eecf5ed118b3a770bec65c6c6b0226fb0a4e4f5de77a585d
SHA5126c6ba322f4f3143ca303d86b19154745cce2bd596f56fd9ae66c7e42a5ecf3b7e9a132ac3005d25aae97d0ee4819a617c3380de760f69556cc464db591c49e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55302bcc9c88da5cb40ec1a1ed0f1487b
SHA102fe9ae608492555df4a0683800e292e5e6aabfd
SHA256570f1252953b1dcc7c0ff308facb1839d924908a007b2cddc79bcd21f9f6390d
SHA51274f837caad6ca671c50c394d3f5a7cb3eb43fd52357b26a977c8ab02435bb499bac8c5d80ba5a62e7120e8e6d1378f65fdd97b3ca045d50effa4cf64d6550acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a77560ef3aa2edeb027b665f360f56a9
SHA1d0824fbd30c36fc2c8685fd41c394271f5350e73
SHA2563348f78289c84cc229d1c707d2af4e228dd94128ca7273a22cdc2f73641dcf14
SHA5128f13c10ffeaa42c59d986feae27d7cdb7cde37c9ff2e30bde590d12f70cd51bbd18b4e512627ed50d1756e1473f47eae8dbf565a214aa0e92bd6f1caca17e5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541c8dcbc9462c945320fab62fd6acb2a
SHA154f5b07fe711de99fb7b3ad80b0ab14918d7b0b7
SHA25659a64b37692a871e2c64b928fdd452258b93b8341419eb7e49a07cfc01b1d903
SHA51264b909b135748338c6bc06b744eb555596fbd950edb228584d375f47335c35a2d8fd296a2f42afad16bebf6ea95040231f77e50c2bb917113fdd1e89b464412b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd0f2cc26622710873e9b5fe83d5789c
SHA114e891c9fd94774cde2b15987937e75fd9992f03
SHA2565a8f3d2350ad54374b41e414b96d63a7b6c0c730e901ace06d4ea89f16fdb122
SHA512c039d3e1f2c15ae76880b4cd0dfa54d40d510ce8de05e43a09b56cfb9caea3c023b49d001e60895faa8b1381e1d6f1945748473c2507c43b5671fcb39a5c04b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50485a0a7f1c36ab64dd733e11ae82c5c
SHA1fceb6f21fd234ac08b18373d72866d8cb604ce71
SHA256811ddf0594e27bd8490023b410844ddeb09b6d8101c22469ace1dbba942e365f
SHA5121712ccfdfe8a89bc36e1a7ee632a8ef54fd027d1a0ead58055a0817cb6d9cd98e6e010846ce8a2e97a517db4df966a8d7eb0f55433ec093a921eaa44415cd62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5793362664431839226f1b90efb754ddd
SHA1441140534bc887676c75c16f80a23e906559b393
SHA256f8e54bf14c59b1ea0ca65d1eba26a5dc9564f673ceb57144016bce02085924c3
SHA5121d34b3016c3687a59bb913340f3f01c19a472ea54fb2b70626d9c0be848946bea778cc5d0347dd95c7c0a8ca6bac21e41935365ed9df11e04c0550191fa16225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e7bd756890d696c6f074bfa1442e4ce
SHA14521141e03e3f8fda003c657986a62927192dbd8
SHA2561bf6dfe9c1583c9d2f020e1a272395570a8173f0936181a7239a339e91585753
SHA512ff1d3cb011626582d60746e144d496263b00da468d2a14618744ab5658621efda5ccd132a8562d3951ea12fa7252f1934131be5011a7dbf304af02e9e7a243ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a363c901629120cff26106709cca436d
SHA11bb758a79e8367f9a1f03bb71f3cdd70cdee999b
SHA25682d36ca5c64463ecb1824545f5cf46fb407b6b4ba5fbeb8b6d430b632bb06821
SHA512133475156705580e757761750a25c14dd0c53c46f98dff058c9c3f32841ffc202599fc9cbaf25cce1863c378141da3490fd49b119b07a9bb67de8b7f06c3a912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500d257308763b50cbd72c832d25cdf12
SHA126fc25ef21c3d3ad9c91b1712b1849b57865d8d9
SHA25607968a5ec71e0aa3426fbc03f00cd727fa681c04dd1a4ca955dbd3f5c38f61cb
SHA51218354c17470671a13c621c343f525b8e3414bc4228f8dcc80583cb0167b512804791bc0982a8974bc094bf20a8e2faca86539628cff386c39199a07a36d4da82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508255c72c4f847eef77cd7386fbe8ff7
SHA141e91c02ab1c09c78c052fb86a09c5f7d9a8dac8
SHA256169ae0750e13c0c02bdfc499f2de6e496294e2dc8271e83386b6a66d27fa594e
SHA51234f9fdb2ae6c57a86fdddc1524f2868d9dcd87992478664c593f615b9ecf20ff234951ee0a4ade950b3cef0d9b16c6d656dcda3d2fe101599849f695d709274f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c865bf17c66ed0f6778532059c7a89df
SHA1422209ac1b82d2ad68b0aa0efb14656f4abe5bed
SHA256a19d974a1706a9040ee60b1775d53834183b47cf61e38f105d1605d9fce0c5ab
SHA5126092cc013243155d4c5711257facfe5cd46c42645e9c090c0d03bb45ce0c90b4aba2b13c8d1de6fbe1a043724705bbe5b2c38f9c166341ff7898de8bd4c32ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5237798c1f5b96866bc052cc903142d81
SHA17561904ef439ee337081938fb4de64fbcd457bce
SHA256ac05b0bdeb7bfd5188b79c45d95bf94037eac0b93b89179a136bec5ec03d8510
SHA51254b9317b7f287893cb9715c06d03a0c0219b9dc8755d58c4bc6198a834871b907c858049f30b4a689e4065da5bea6b6de1eaaf0a24209df5b9265c706710e47d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD530bf6a5e2bbfccb6bd47c928a4cc72f0
SHA14352e5b00cb6c6339835a1deba26c181f93716b4
SHA256168e0be492087ca359332fbe2bcc5a1b09f720414232705ab6e055e5a3c2bc15
SHA5120db8c7e935efef461cf3bee5754f7fc02cf54098946cfd4c4fc52827e5eed9cb2676964439efd7d3c80f6bb10c48818c88206c6953eb858c0667d2ce0ead8f60
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a