Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 12:12
Static task
static1
Behavioral task
behavioral1
Sample
MQ2Rez.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
MQ2Rez.html
Resource
win10v2004-20240426-en
General
-
Target
MQ2Rez.html
-
Size
10KB
-
MD5
a4c1ea34eb478a732111ade3b3518466
-
SHA1
b1fa4306e1e4e5ea8a3be3cefca33bd9f2ab3963
-
SHA256
7ff57a45d08e86660dd51c1acff71cd4433172f8711a36ddee62c6c5e10de2b4
-
SHA512
9634b15013a13b48e323eb369b5a39862d6905567f238fde58dfac246952e92f551c37ccfb82c7e2a96dd10d6c088800f8737dd702d67d4f2d0a96001403e9b3
-
SSDEEP
192:H+4kUJHGDll5b5A769A6V+C0+3wPEwujqdHWknWKWfkJMhNIjcBSkIzl+JmDtN7b:/xFMXl5266OWMCM9oxhf7L
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422542503" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{282D78C1-1836-11EF-8FD2-F6A6C85E5F4F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f2d31f89e021c747875c189e5ab7ad58000000000200000000001066000000010000200000006ea531d95b57b86bde88bc44965c0c9b9245dca8856e566884be20136d067fa0000000000e800000000200002000000059360b3bbdeff341c3f870a14578abb90467bb55e2eac5245092526494dc215920000000ca5db8fbaf465d13b607203ce9958df9c99eb42066824fd3b6626f9af5121774400000006c92f3a6d36666ad3d08d3edaa637f6ad3fe8514bcfe44809e43594a480917798573ff1ae4d9e55bb3aca1831ab7b0e81989d93d2aca0e23fe168bbe45c9400e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d1a4fc42acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 3028 2924 iexplore.exe 28 PID 2924 wrote to memory of 3028 2924 iexplore.exe 28 PID 2924 wrote to memory of 3028 2924 iexplore.exe 28 PID 2924 wrote to memory of 3028 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\MQ2Rez.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592f936e050ddcf24feb0c5e09c893699
SHA1e2ede5a165fefd40f8028564638db4c96fdce931
SHA25600a19969647f6ec7cfbc606ba17c451c32e7b8c307e676239149469623c7b301
SHA51288ef482821d847838b2eda5def22f8bfad95d8088fa2ab4e7ce35bc037efcebe43347fae1386d9268737b57c6e7b26f1c88e967910c3374977541b85157af327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ff18d9877c3f6269016ac4bea7b05ae
SHA14e83cec36ed2f12627968cf41cb39bd442a8689b
SHA256ce1f48a301d04dd306f5dad14d1bf1812a06ecad07be0d18efe7699c973e4cdc
SHA512052894602825e1ff5ef9092cd2c06337fb332eeeafa0a9d7ed0ca6c653fec462d0bd0f907466fcd616c81f0bf342975e6202d4e3da4305562b5438f6eee365a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506a3ec54f4e972798c80e02a95d7478b
SHA1fa10110ced954d01f9588655b51afa3c5e8a1e25
SHA2564324889df00d3ba04f26595b4ae92197229a0c1dbac8dc71109e91fed3971d74
SHA51238f5e0168e965058f1d31b9af82b42995e202e9031b5f43036f36bc91b5bcfba6673614e41b7796e192b3ddc0948bbf89aeceea701c999882141bb8570be707f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bca884d6c8bc73991a711ee4dd84b161
SHA160c52b6283fda232d0ea1262f2a6ae2461149d5d
SHA2564898245426efddf0259e123ba3e53a3f2988170ff76fbd7bc285fe0d2736026a
SHA51273d86fb839482f851912aad6fad5f52d0f85f792f2022d9b123095d6b9becf789b30fc64c4b909903973774c409533a3d969fd9cdcd6686ad5ae29a1eaf9d4b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e38582b6e4f06a40307d2ec082f41c1
SHA1ebd70332128f10c25fc89f182e9cb8188703b521
SHA2567661205fb9b90a1f02b069f16a1f3421126143ce9ee47b491eef74380aec9868
SHA51256ecb5fcff8623df94c47215b4cd233d8efda7899b262224cf1bba8f5beaee9beaa22ac393d45f3ff2a551d769456a3fe90d35f7acd51146607f77cd47e0bade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560e5ff0d2902ac71cce99d42972dc378
SHA1e579b37437b51c590c30b1c7763c56d86b3c1b01
SHA2566fb5bbfd31197fa217268d843b4597695f1040bc44f6a952dc1634d960ad93ef
SHA512df605f8cada74044546137fd2ff976cc5012a18777e4df91ab1fe4e5a5609f2c2796b4007e19bfc43af26e9f79fdffd707e9c502e8c77e8962d8c9a736ea36c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50012dc4ae1ac870447321c2f3cebb472
SHA1af22d0b989e104a371aff08a407bbd54c635967d
SHA256491cb3b27c5baebbb1ef5870883fb2b1adb73bbea6cc8c67a6465274a7543188
SHA51285cdd1a69eeda2dcf27b37f8d04dae7bf534afbf079cf11b27b942b7186f83351b0bb88ad6e22c6b585ede94b6a61f454e01a9d530a4d821a457b34e85e0d408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa986b4ac12a7aa59a3c441832938fd2
SHA1cf752aee628c308aaf514fda36a5dd1dc257ea3a
SHA256416ca637f32acaf2cddca110b2d3cffd190bb05974f37e1f77074e69d86678ff
SHA512d29ef9001ce9d35e108a620f1691db52fa77cc27cac7a316f38c17891303e58500231e52a24652275a831449d54ffbf67a4c554c3366a507bdfafeb48a6e916b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562bc9a775c16f8bb30705a185f6800a1
SHA1d817e34eba6180d22f59da01674e9413973c226b
SHA256b28b0051dfdad5ad537d133ee4f8a2bbc879cdc6dd03cdec9a44003873566f04
SHA512a0067325de49a174bc2278dcf3b6c6e133ce230bf6221a65e988e4116d313bcad11e6bdaf284d11518a440e0050bef355bc65753ed892d42155a22fe3989e682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57373f2d428582b5ecf13bc4b03e7283c
SHA18c7ed7acc98a933a788984ea4d7debc8e8819367
SHA25660b2c82c5d7282b240fb9a65b0a5b789cbe1f88e6a72ceb8145e5488fdbd324e
SHA5124e73f18f588c0f4c4ceca5aac54bc3a43f5e9fa1dd3fe9274efdc86708f8bfeca9d80044aa2b31e9e68b0bce077da2ddccc266ba9c89a08c582afd708e4483f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae430dc681f512ec051083147783079b
SHA1db4bc0c8e2d19b02a3bf764be53920cd4b988d80
SHA256391960492e94f3496a601d51e1ec9ef4a7e88ccf8063b94243a273225e0cb46c
SHA5125db8f9e965c17ad33535f40be3f3a8149f896fc53fecb5c4b8578ede53cdcce0134f0f58b8680f2ba2d0790fa766b99db2390d380fb3e7afa2ee2cd5983e02fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5411c1a46c8aae6191950199ca689847a
SHA1414a079ad804a3d4f49ec01864ab8a71c49dd8b4
SHA25619d3ce13297042c840474775dd292a980e4fb4345e4f33e95db6dfaf9461dc20
SHA512a7e02c6fc7691e122b6f8fa12a29515cdeb8138393cd97185b0237be320d4bf422e406b301d7864157e3ac3e7cbf6bf6ba2214af513041ed3ec31718717080b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5631474a6231fed391c78c17474f27963
SHA1c22a0fe8918b1a7659805a3b66079dcc95eb7faa
SHA256915a19ecd63521e4f3ffcb28ad6b66521db569be83239c2197f9c7cae8df94a9
SHA5125e7eb70d631ccdbdec0a7b85ed4b2890449bc34e11aa38d5eb7e644b5ee71821c0b6883eff65718961637de9abd1ea4f8b64acd87a4a44ee4ca3b0d52b165bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512f825136e2e4ebeb333b9b1fce4fbb6
SHA1de945e7ad9fd351519c5e7d6c7b7a2283a9039b3
SHA25604b8f6a143cae9385abb43a5f86f37336311c6a0d45d07954c99d63e5eaf7e59
SHA512581d81404cedc816098363799410799b81b8e45dd57a4866c39e5811d3f1854b355e756d66ee72c8e75f4a74aef62d72358194003d59e6a2b7e8099280e0188a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e64e76ba8787124987f464f6a6ddb404
SHA14b4a3820b0d7eb9e8a844184ee2e279e2a93b5b1
SHA256328c762f81870936583e79e729279089109e02dffeeecae179608a0e569bcfdc
SHA512e186442769b374ef029c50927ff1bc847b2c5405f809086c4263d475c6178208acc5029c93f26c895e3a9a39cda9a77f8008fd266d369d872dc15e8c056a8098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51774f15df9c30ce3a216f173dbca783f
SHA1edd1a1c24860b73e36ea42ed796df8841f7dfa6a
SHA25662be294f99b9697f00c39a7288068d3f35bcdbe427eda3411b9034083c919541
SHA512f1f8e2fd4ecf5b4d828d6a98bdda3496f06882697aa4d654c4dd1f88b873cdb111f7edfa5bc5036aa536d6a96b829a28130005b0489be8c1c13f6c7be788701f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55979d223a3535e01c206e6441868f892
SHA18262717aee7d09935e13d84a9554b5bea8d1a517
SHA256e6291f7f0e7d544e48ec0cda74b0ce7fea53a156a1b8133c361dd4f85cab8c70
SHA512b093e6d3c4779b0f1ba2e599a26baad29d022aea5ee93d037472bceae18865faa6678d139b9293331cb0882d55063ba6df1381655917a55c0e51a43a4f66ae42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b51d9cbf080f1fe5f4af61380264cb6e
SHA15a81bdcbb881a90dfad54e29f2e8e57a8dd7af4b
SHA2563218b47ca53d9365d9464c379f91b4a3b2268227d0102e035cda0962b3475dc1
SHA512f5d862fd5db52c268f47b8d1f815be3c6c67b2e40fadf1dbd4d8da25023c2d18db14c6fb9f0a7759b2bf96bb0019babd648c0beb7df6bf01ee9b0eab31e30443
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a