Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 12:04
Static task
static1
Behavioral task
behavioral1
Sample
uuwsU8BaseFile.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
uuwsU8BaseFile.html
Resource
win10v2004-20240508-en
General
-
Target
uuwsU8BaseFile.html
-
Size
94B
-
MD5
a7c467281ee4ccf8cfdc53940875bdd0
-
SHA1
0b8e46511f7bc4e46a5e4cc50a2e64037fb6a312
-
SHA256
187f4453bcdb47e1b7456e53752e1d8c5a51b837ea72d767a8c1f3be877fe47c
-
SHA512
a39ac141361a0afb8010aa488e50f04f3338f6d1c2240f0f8c0a64c0d5db1daa53ecdd9d323baa4e0ecd5007b2d54ce8e7582baea3046f69bbab8aa8283007a9
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422541915" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000587e33702f60780268b4ef9c89d15c3caff868c7380855c3a94f422daa1cd07c000000000e8000000002000020000000671a80bc8a97c3b9f810f37f8f40ab24c6c1a0873449813aab57912ca648d86920000000577f8e28e3602b1b549f6c41d6315f3eec983a512bd9d07beebbcaa8c19a9705400000000a0de7f738f68d43d8d90de60cf98d99584f8bdf81ed3299e6415e1b8efc41f7572c81328bceb8f5e2d175748fda3c7726c23250ab6557c5084789f7c46397d8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d5d29e41acda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA4FE3B1-1834-11EF-A9A6-4658C477BD5D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2284 1728 iexplore.exe 28 PID 1728 wrote to memory of 2284 1728 iexplore.exe 28 PID 1728 wrote to memory of 2284 1728 iexplore.exe 28 PID 1728 wrote to memory of 2284 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\uuwsU8BaseFile.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5425b26bd9378573d2a6a924e0cbd70ad
SHA1b62d860f053f52c76a795c9d4d17e3d24e233b0c
SHA2568fcfc4a4c4f6bf32499510addb395a357e610b51a647a55f60893fa15b880b8d
SHA5125008a31f6674095d70b69f2a0dea10070651373524d4ad6bdbc72951215d760c864691db3a30bc00e32a9f0bad5c13bada82f8b09f7528bf099d284906d54553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cf995df082e5e07838bf15b2ef865cf
SHA193c2d68e8f96a9097d9ce9809f0c301b7d2a5d09
SHA2560ba338704ddae20b07f7ebb8e3d401e93f5a1117ae1a93a0d7d7a0fcc8ae74ff
SHA512107ec2af00f29594f3ead7f4024d893d86f594c31f03f2450dc5fe53eff202f2e5161e2331e00c4b9c6a34daccdc45179b98a301989d1c26515a355677461fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cd1bd6a3052bef732793b82146306e8
SHA1cf0385265057c171c7c0b663a9609c5076dab625
SHA2562c941115f6edcb96a2e5b08bda1acdf6cef3e179821df6109df01fff10fa8a47
SHA512f598abd6291834a59f6689991d4d8f49e4112e4fbd917925013e1cac2f4db19512be5466d4553e90e81d2201d2a86ab1737bbacab7b9714da7fdb32665262df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544aef1864f0f417289dffd599c5ae785
SHA1bd3c6316891b866cef352613235ce83617ab6c2d
SHA256d71235f432fef073b530f740998051f82d339d1a09f08cd1fa0e6c56e1a5c950
SHA51212c6a482c9135aafe174649c47f0549df9577f573f07104c6cd595dc1ef33d08110bc4bd357d3372e84be74c028e38d47d6f79451af5c4adc8bf71b46a72126e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fb662f17f506b95dc3ba6c8c491e94f
SHA1ee2b53927fb47e3271bb93a7a865014fc2d4e8be
SHA2567a3faa2dc6f7e7751ca2a2c89e9adff489c89ab31c8b4ce9b54ad00b12117a86
SHA512cd9ced77f83077177e1abf143cd24868dd5dcfd2247ebb500a1c0b514cd9865c93113c592a50ce75fdcd8363f1b44b1f484a126d81d706d9a938d00a80184a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c0c914e3172f259ec623f6cfacfa48b
SHA1e509446ccfa688291cc8d7a96d5c0a632e7150df
SHA256575e22c0842691b7ab217b3138b5565c0dbca7537117ffc4e07cd83ad22564e9
SHA51281f912fa2fd8150a35ed7f4d1da4e636cc2cc98f09ae9e239affd982957d1b94b9d0c69aad66292db49821d5619ead33de8bf4f16afdb7d235ca12f46f04b0ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576670b8b13e820cb50dc386721eb462a
SHA14f1854589ac734b74d05169552c9c9024302b8d5
SHA25619bf88d6ef7279ff6af06c919a864a5261974fd5ffacf8377f56873b1e88659d
SHA51222d855c301c8f7d0bde705ee5ec3d329e4d2a71689f81df44cc9a81786e787e0c398fd99cfd8d78e5c7a6d901942eb8a2e1c31ca078f33f304a0c868a113771a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f1ba4fcc78ec901193a03b14e8d73e8
SHA1a8d444013b881a2f4b74647e3168cf0383d93f45
SHA256d835688804bed8871c55ee48171de587df7add1d24c316d8196ea2ab2a5ca835
SHA5124b4a5cb650348144be7ec12f1bbfe8132a0d7ebc6d21076609ce120ec2a5c6de1e88ca548323243c982c8914ef3258ee9426c740d8e0a48aefc2f0ffa27ddd8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5899c6f3d1c4965a13eaa00a57827b18e
SHA1c5654365a99ad9e7abbd581c7a4d052f9c82765d
SHA2566050689f036206f4709000cb6497a2ba01638975b74a4757595a0343d87e557c
SHA5129f4e305885cd10a1f6c64719b400da248816df9867a678904152206bc007c583e2157486c7a1874476c82c52ec9f398966cbc1cfca7c4a4bb6e088a503a02fe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a6c283976ec513296258af879efa878
SHA1843a1769e5e68416182dbf84d30edcb2d39439bd
SHA2565524e7c5301d2e90adfd47562281491c150af9f687551ebcab5e4658b62e95cd
SHA51280d31c3233b994299b924e3e8403d991730efcb0f306af88d18a512a0c033115e83bc8ff65ce426c6267366fa9ca9275c5f9324faf7927d60f3b8ad47893a79b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580a92985ea33033771be510ec6a5dda4
SHA150cae9211aaa5cba58c9067eb62e3e393ba71c7a
SHA2569e237a9ee0a1054c1a20ed40cd8aa7f803dd0f53588addd8027cdc0bb51d98de
SHA512f3b8930c90e27b3fefa0f8897b06e68fae9bcc58aa5738b32f128b83ebfb144fe64f7d1ee737b87f0378416ddd9b34787662d14affe180e8337216939be6086d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad40cd8f57bab8fcbc9de9e2672f31b6
SHA1e206a099c669b721e883d3949a7d2ef0cc8ec748
SHA25608a6ae3e192d8dbd220bbd185f4cfc4a52d386e8769bbcf5817767d0e2642c6f
SHA5122e1f590fbd5b05703c8256e539be1e2c6560f54d604a1b62464c190d642f8b1388e41e22cc0f90c3f489ec53c207c314a01557d3a7ca2956e2780eeb44f3d3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517db0823a5ea5d437ac810a7c44647f0
SHA1f00b425ba8f1a1666259114251435ec66c611a5c
SHA256b9cfe1b7224a5b65be3b1390620e35581f5a9e78c0b49ef0cdad3230ad6981e8
SHA5120644ea175004b640fbf2b6ffd574bd3e1cdf07c266c0a3a35b394589224f58314071ee38402f8539fbd6304daeacc311b241770d2b2ab0ffdf212bbac15da5e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509cfc3e118a949c73706b6a41c51d7cc
SHA1e13433e428434e936e63bcc54cd582ce380a20ef
SHA256bb35280452cb1a40ebfd6a72299436c5190cd586de0c2ebb44761743b0fdc759
SHA51277a9e854c2310048751171b3485ae7ae956c896409051c033d2a5131e4514766997ac2d500ceba732d819c05193f67199bfcabb3934547d322410ac351d7bec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541d485e9bcd52ceb836e44b1cf67831b
SHA13b0f078bfd00faeea989e295af112e767b2c238b
SHA256e90cacb8c0cc4f0130c4e36276bc52c59511cb9f4862877225cf5d046924d526
SHA512286f108640a0ddc791a7f146884bb5ed36759d7941459a3c7f9a1420df2559c73faf9a51758502e7d12a9fe2bef5ce637931876af4a23e074e7b6556bd7aa3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587181d37f4da0c22b227b46608150d86
SHA1af128dbbda5868c6857d01832deeead3af30d0cb
SHA256c3a6d3c12f7be45a47cbb9ff9ba42f5e559137bcb2ed615a75600624ab9acf10
SHA512db57fe3e0f16f68bddfa2ee31a65707bd27fc7199d1b4c526068355eebf2cb966b11a3d0b1ac9ac85eb15c0e48504435f5d997cc8e0a8127a852bd2a0e39e6fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53daa4b9f615011053cf4c6d6e570cba2
SHA1462761c693c41c1c712f894506a2c3a0cb21a565
SHA25632b33152237cb72d691b2af444b2f7743e3d869a99e799f4258897946e782183
SHA512a994192603cfa5feea6b982ec00e756b64ba6a860fe573e57e05d72e2621cfab71863371b6707d5f0910fe7a68a87a4cb1a1011f8a1e6e9c0bbe7c10578d0533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b3c7ce4255ebe3eda98db8269d7d528
SHA1909895664bcce7218740e53c87f6db9314653d18
SHA2568f09964e2d8417b64a2063ec0aa43019f571135c3f039dbd01131dffb804f9d6
SHA5128c690d4d33922399651e6f62c7141d80af15a414c8a10b486e5ae8f9863149e5de38034cab1a03ad8a33c71fd6ed83de86734c4b7ddab0ed8ce4fca782483471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54738ea130fdaf2e167576161ae45d70b
SHA1e314d9b82c91057dd2ef6f9ab98daac7dee6b1f3
SHA2562cbc1ea5bdec1f4718bdf7771db9e69c379b6da37af2badfe59f1c1d219aa6d4
SHA51217adc1786df203d4bfc0dc7179b97d338234233fabfd34c6a57de9f09b478c0bb5257f8b90e484d6a3f55d1e18938db6daeecbdff3f4e6e944c5ec8ee67ae53e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571aade8003da40f0e39c7c82b694db6a
SHA15eb01852bd81411ac1f9f2283a4c49015d5d56f7
SHA2560685dec7ede6c5b95c980354b6d3a5f53620c6176179ccb7ed27e6a1656f5537
SHA51236bad4a0606a98ed732c76b23fe02729cf05ec02f2678a35a61dd5d212162610d0d95fbbf288f378b6fcf6d088b21a324195443fff6da6f82fd7ba7b51cfbfd7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a