Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 11:43
Static task
static1
Behavioral task
behavioral1
Sample
ConfigRelay.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ConfigRelay.html
Resource
win10v2004-20240508-en
General
-
Target
ConfigRelay.html
-
Size
291B
-
MD5
274d50a5b483df81cea731e7fa6dc06c
-
SHA1
8d25797c2b382bc724d15d3d6d0976c42e7901fa
-
SHA256
aea7648f39b2161f444a4687308a3f962636cfbd08330eaa170e4565a7251e6b
-
SHA512
17919727cc440f33fdc2e920733d247a9a1abbacb2b7b5dbb368e8cc86deb7d4fcd7626f62aabfd0eb42d5226795730295f7f5d9cc502f0c147b2ddedc2ce71e
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3F565F1-1830-11EF-A649-4E87F544447C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422540240" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30577cb83dacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000005e5db7a8503e37086c4de12929a301ec678242b7310f083002046be4dcc961c9000000000e8000000002000020000000ccf2c55a88b2b2ece5e9ff69af77af2dde96450dd9d88d8d5f95b8b37e948008200000000563d5d05754a2b2341e0051130fc6c43cd8b0160b9ea81ad604670e2718ff9f40000000238980dfb62067abc33450703b8663825dfda52003c78acf0bc8f1550ed91052c1bf8a1c02b5451988b14642a0b3f17b5675dde5a0f35cfbde4d09da051f1fb1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000b9114d39aa895d365fbc787dedc5bd930a6258e4ea747108dfc97cf292f67694000000000e800000000200002000000058faf6432aa4e82f996b0f47d7c8804b4f085c4c83e1d35c46420f67fe6d39c6900000003db2bd2535c073e5ee287ff450907105d89fcaade4a0bb8770fbf11b2f1244ec004107bf3ad8970c492d6a767a0fdc8c387ac8ae319caddff08a0dc2bca4f78e5cdb126806e4d47f25a22f973d3a93e2b33ffb67406c63c4b66473f70def357b50c67ec7971bdf868961f0f10589f8f028938f7c8ba527173bd2672373f414dbcacae97855b6f01df97c0ff8a08ec93c4000000022d2a7659ed9ea9e091cd8649e779b12c71ab20fdcf02525d11cba156fd232cf20f74fefa51511e49bbf911f61db2254afed61257e78197cf3514abc018ca174 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2160 2420 iexplore.exe 28 PID 2420 wrote to memory of 2160 2420 iexplore.exe 28 PID 2420 wrote to memory of 2160 2420 iexplore.exe 28 PID 2420 wrote to memory of 2160 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ConfigRelay.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdeb4ae7ec2573c900a7214076aaa80b
SHA1af4bae5fcbe2c9f840849caf21aab6a4b8696dba
SHA2564eab19e62e7582d359ab7c06ac09c2818a9d46486cfe5918e418cfad1cc76989
SHA512950cde6edadeb94a85c97262c14bf69c92b9857f84cc6ace792566eead762a75e0d5d869a6780a0df56784d91b418a6a7c80da0b0a2f6a943f89853411dd75cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583515b89f6b008c1fb319bf429ef33a8
SHA1dcbd61a1e198f260b0d3a7342b51968c88be4588
SHA256026a7e66d85a67d4d34854aeed5fa6f183e734920415429e81db7ffa603cfcd0
SHA51200a4a48954b62028333345733a5784a9cc8e314d0a7bb947ff613aa71bdf8831737617924a50dd1b2de9d9a384d2977fc0272f6c2a3d35876279a9c627e93eb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f43dd20c4114d5ac1a6a66804797afff
SHA1df89e3c163b53ff4bf1810174f5ae92f2fa47356
SHA2567a35cb39a0fa05e1cf3dc639b6be8bf993fe565ef234b4824cb76585312af370
SHA512d795c873776c0462166b6403b019a9afbb76567e7c3caed2653cbb027cc4a082acd33ef5c7da4edfd9953930348ba34d0a7f5ebb00dfb801cfd7cc56d97bcc68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5e0d31a297984e927244cb922ba7b43
SHA17e6c7021560500905ce11755a1aaea40abdff1b0
SHA256a187453009a68c19681fba9953b7a8fa56578e98a732c29bafc6962c1526777a
SHA512fe716c133e4520a29f5b34bab5f135defa8b0124716f8439d7b45218da75dd847e4e3c48019a84531d9e3fdcf0e88c51e98f24599f007ee5a066092fc649dfa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585f684420259df420e99235173008df1
SHA11335ca3a538b5c2aef9ef250b6ece9239042418c
SHA256229d9a776fe845b47a4d4dcecad453fd397f81c4d4f7044eb7690a9e33a0a159
SHA5127ed7522e56a616a491cd75eee341ac1a8afba199e54d59c41ea6e98e37990b1bf02e6cb82555afa85270df7f94eb22c0716446afdc14118c488989c914e3c012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5443b06dda3851c114b28b507be8020df
SHA126a543575bb8e920eea78cbd8853b0bcdb870f07
SHA256f3def3a53b3e53518b76363088f35a464ff33c08657864904dda25847ee3bf7b
SHA512a1309819004346ee1d127bc79c2c6e292f0099a24d51393ef439dd5e4059df0281749960ac12b522deebe3a2aae71425eaef3bb8bf402705394988092df1ed94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f794ba43fb4fa4178648578ef45d67a
SHA158a3abc01c321cdb84ecf39ce43b3e488e4c0338
SHA256bbcc782ec28c6d5c5b73e7f686ad99c29c80b9888afbd5218c83d3e07da3fdf0
SHA512866dedb05cd5a4f23841e418cba16e80b315c5c7d5d6a90c9bd6806b15322242b6088e5df921e8e9f976e1ad1ea9f96a6ad08dcf4a05b76ad3f0d78cfe0b554d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6ce2c9e1d9ed39a9e382cde13bc8ed7
SHA1f09f9f403081bcc6f3a7aafda97cebdfd8b26940
SHA2563080c082452ecd24683bbdee0bf07ca2a9748cf3803b534e801d85b238d10597
SHA5124501bd182a9666669936b7e03839d81479ffd22d14be4c85e4f43eac81313523b4070f531e2047d2b8af1cf61a2403da0a55d92cd31c093fa02968281c837fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5173a1cbb97535337fb641b357815520c
SHA19e074330c04820d7aa65e2924568da73886fb8bd
SHA2567124ceafe57edbfc28d143e95f1a4e8fb6381ddf59d324fcf25256eada8cc638
SHA512ee28442fb3c03870e27c8b51229b4a6355a95e6acbab48acbefb726a4013035aa5cc0e4044dbe9b767d1d3b56ab6870c5ce168531eea9b4fcf2413879d480cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af939d0b8aebcc6b2e8f48c9d05c701a
SHA176e820cbce7e80a19a1823e97f6ee7e31f649a74
SHA2568ccec2959e714ec0a060356676e9537c06a0b95bdf66370aab3b77d499f1795c
SHA512b9399f32aa3364d2b3493644b044690a38d35470788fbc060edfc3ec36d9e9b13929c88d9106ba337413b3a2d8b8f09edd07af3bfaae369f205b4fdf52772ba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f42daf39ce2b8ef8da1d2ef02551f6c9
SHA11db3a24e4eb3719f24ef3fa7fb623775277dcb62
SHA256b00c19a4be0fcf2cf54a677509293d263e279887f8d56e68c755f31b300b2ca9
SHA512384e7996e912bd5780fc5f01bede88b0f68cc023efd72be19886bd7e4b1cb1654a858617f5256a177b754505f62221f6a30af179125fa0b5ec00003d309edb5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd6260544dfe136eef2bfe88afd7c032
SHA1431cbe90e983936687fd62ee830cb71a505d3d00
SHA256f16b0ebec81c71089b3c429eb6d77a1d1260a19451b5df70b6ca5ee0efe34665
SHA512f873786c7d7aa63ffd90811fe62859212bfd74df99628135ddd49762ff18387bed2277976be84814fbea8ff1286534d5888e2b021c019b97de9781d4e136c638
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51dc109903869d6fb2824b2e8ddab9a94
SHA15d4a9fdf1024882c35033061b36836838ded803c
SHA256700057c064019b2dd7e73584d74cc32a0a5d0b53e133a377b8de24c97197c710
SHA5127d480dd0140692997b484ff8de7113ec74518097d29104044254f6ac945829332a96156e39b3cba376e1b11bba47d1a0fa17ed6f4fbbe010cbda95d0de1c74e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5309690ba9f6dbe9ecd7fb23dc83d6c05
SHA1f349a548c1ba24f25347946227019d47d42beb8d
SHA256755e910b2a78c9e28214e8da573e78950d8eedf5ed186a85677783ab6857c448
SHA512a076d453faf04b110a2d1e709e71cecd70b57f198165e7cd46d6cceefb28aa701ea2755073ee363d66937572044a89405a897944e9ce005b6edacf9a48c8f2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fe9b9db2e79463b329b98b161f085d2
SHA17bfba0459a4176ee66cbe673eed08fde688b9068
SHA256d1eb040536deb3820a464b168f1af2fc8d693c0f0f845d851f9f8f694d894a20
SHA512002152cdc15cf8c10981086df9575d9d177fd58a274b5201634d018892cbccd69c75d6cf1e50ab14b1399c924761b18b1b21405c43162d513d2ad520552255db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a58ca04d747feaee75f1fc03a7e6f97
SHA192f66fbd78a56c996f1fa4035280e609d595e194
SHA2563ba6d6597358001d1551eb877dae08ec9bb9e37f020e6f068188f739122fec38
SHA5123972d500a607be81d14f429ed3d4ac9b1ce5d196797a73832b6d4ba7674a60220ebcf337694efe2de2f684dd9fd71e8ca1082ba9cd4762645415c7cade01a791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56239f788ce674dfc8a59102ed92f8153
SHA1cd8bfa843bbd55a95953cdb2c34b7a09e3dfa1a5
SHA256dc26d7ceb905e96d65fb397065c6014adc295ddb26f40302c27769d24eb9c393
SHA51242df3dc072149e42ab6966b3fa33dd801f4056ef9de730fc15be2e202072ca2188d5e0088393798be223430f772d403ab79f69f327f3d66d4aef50c655146546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a1245435c19f176b70a8969da4dbeae
SHA1fe381d4a87640d94533612d9af142d3aad951447
SHA2563101e90ba1007ffb5237e97f377220016a3f97a944a2ff1aef6bedec0ef91b99
SHA512df831b70d325f3434ebdbad15d6bb087bbb05d1952b0ee265ac0311c7d260ec1e5e02d6ceeb5a18bdbdbba76460b02e3e3bd2c53a95b2e37822755572c58355b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505f9f41ed216d4dab5e90c3a8af447b6
SHA16c0a815b5841930add316b408c7eca279cac19ae
SHA2568ee936f3bc4d7a29555a9abd999c54b9050eb419b694eba240383afd6d59db16
SHA5126fdd197412bcd0405d4278511b581f025bb5436a53af0828f52cd36f01cc341472f2b5b1a5e3494c45d20d83ee0acf22fbd80b5bb2176879154aec8cb6c1cded
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a