Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 12:23
Static task
static1
Behavioral task
behavioral1
Sample
HsCRMWebSrv.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HsCRMWebSrv.html
Resource
win10v2004-20240426-en
General
-
Target
HsCRMWebSrv.html
-
Size
4KB
-
MD5
b736f4c0f4de69685dc5ead5490832a9
-
SHA1
18149668531f2c3fcd6236502d02a0c6068b1453
-
SHA256
1279f7b0bcf3ae16829fb49b4276f661fe98b87273983c1039cc017ed713f8b1
-
SHA512
2cfe4fe5f20b43d58e5dc8fb0a9cd648d83fe53fb6932323eb735c345ff2170618c9981b0352006f1212fa80ef130e5dafdef336a6b6cc937b6aed48a3126a15
-
SSDEEP
96:oOTJBHBJDJgJLJpcJhCJz+aCJzkvJd1JzUJcJzLJgr/2/d7e/hCFREyRUsw6FL:oOFNVM9OAOUdDs4Js/2/1e/Qnrt
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f43c46d5adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71B128A1-19C8-11EF-A965-CAFA5A0A62FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422715284" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000fa9e090caad9f24dbc586787c362cccd000000000200000000001066000000010000200000004c9517012fd6da1a28661e6bfc97371d12a0f5e83f7c5d6ca2309eea7fc17d2a000000000e8000000002000020000000a871d1bddc146f43d17ea97e04adc5f721ced47cc0ddddc66fb69e91e1b895892000000061d432571bc10c4d1d2b1925b2db15b8b1ccc0f1c4d3e50f6ff274947442ed0d40000000db45af8071a7ca0ed6eebbbbe8534fc2b7dbc1239946e7c54b1f009f58a7e0d929e12f2b1710e959b05b27ce218d9d7f9ddcf7f269768c7b185797253dccb9ef iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2080 2872 iexplore.exe 28 PID 2872 wrote to memory of 2080 2872 iexplore.exe 28 PID 2872 wrote to memory of 2080 2872 iexplore.exe 28 PID 2872 wrote to memory of 2080 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\HsCRMWebSrv.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a61dd4ba60d6247562c223b6022ef3dd
SHA12194948a874cd812bb14e6b30ba582cc1b9bdcde
SHA256120cb8a50dff8a95510f6d6ad99195875eddbad8bf9e9e6f5dd2b4247a04595c
SHA5126cc76789958916d2b815ebafba4f6083c6cb78c7908d3885223320f7bc00996b4eaacf4a2b4eb865002f168b4775b2e7100658f0175983c88cda60791dc31e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53de46529c852e7cc5d6e2b1ba7c93792
SHA1c6be375b4b7008139da13d562503b2013a3875bd
SHA256ed73f0b6764f3a90c10fbd57238e1ab3d943d92e888ebcac19aa06f629750039
SHA512cd9fe1a13ed097149d555fa6fecc8eb6e11dc9921b44b6973cf7c62bb2588a16209cd7d3321ba424ac7f1a35857c6b40497bb06aa38ead79b27ccb25cfd325ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555727a18ab04154a24ba8c821881e673
SHA1ac1a511c1767ec86ee048214b5d1a6f1dd95e36f
SHA256b28d4192925316777739c15538deea87d2d2c8cc5102c7e604e9a4b469cf4a3e
SHA512649329f9f0448f05777f228f8248faf39cb711b997eb731d7a27604ed5d09f03ca63cd31128108b88c1bb9c3953bbdf31e8a854d8314bb405d09dfe832be26c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525022774a6f051587c5144b17df58c98
SHA1d284fdf266a0b1eb7c8be6fd388800b5a8af0698
SHA256c6d79972f6956104cd806168c8225eea12e323c7f942335414ef3c4377872f3c
SHA512b8e912811cc9dda3e4e22cac145c8123dbecdf3f23ed6a2b150975704da36f2a02c23c518ecbd3b2a4d6113f30ecdcdf6bbdc5afe010fddb2659fec12d0d50c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d18049738b3d848aa070ac3badb6e09
SHA145f63a1badb2349f2b76038af51dce9edc1f66c7
SHA256b5b7af0a29b2ff7f4355cfc75040a57ea265c0950cb51d45b3ea41fb310aa17f
SHA51242ac69f19711e7fe31fcdfe05933ecfc325abdfccb2de70c5630aac7aff3a432cbd8df2280cbcb38b87a32e78d3843fd0e35a40428b7978159b6ddbd1db7f38f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59890a1fbd52c686a71ab81c81650f6ed
SHA130f4dc7ce9ebbca91e8a767c1cd3d8b17d962f8f
SHA25661e5ede6339917f493b14cea365559b4156dc7c570d7ca1ac2a28db7bab4ca57
SHA512fe50aa4f0b6740f5108b7a342d18f980366b616807f5215a8729dbd162df864c72946ef818d4a58f4e9c796fb2b01bc552513cdaa061943925213f178ed6ba52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d8a2ddc57de908470381efc021d0d97
SHA1540f1249a2bcf848795b64b8184701e166f7c5e6
SHA256a83620f95c73aadf24142c4290748575c3a3b71c8fc658007f2a71d6f7787369
SHA512dac6933069610d29de5ecd3fe18a633629823984a5f4c1899e940ab411246374cf21ba01ea65753bb25cf630ebaed5808e547a449b500bcdef8c579ae4b076fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a18026fc13cd7c5bf072023a7dc94b97
SHA1f39b5ec0780a394520ee49431fcb359f8d582ca6
SHA2562af2a34ccbd58df129849c28a449651470ae96f55dd12b8245560d60451eae07
SHA512a42f0567eaa2dca1a1e672669447f437af5a39e077b26f983179dcbc4bcbbb4149ee224f01ce48642972fe77ca0f56f5467e1ad8a6a556dc8e231beedcc58bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5788e1cb6ede9966e595a52a76acef86b
SHA13b77992b2c4bc2c34ebc7e843ce049ecd6797b68
SHA256469a2191e5b7c23db4073fcbe457cabb1486415a81e959ce9daf93d40bedabf0
SHA5121ae360c99fc8e63fd7cb95823fc427d5d7168fb755234bb279b4787985a168941bfb4b841231ad0e8a3ff7e92587a17ea72bbd3d35c806d9f8b459895c0b7573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ddb61c2c6bfe48b28ece1371c7ae662
SHA12afdcb30d04983e433e318f66c57921beb44484b
SHA256fb1b572a987bff3243ed19b1966e8907d42c29d19cd6aa52adcbeaa93dda8d0c
SHA51208085e5f51c103e0e5a61f63fc8dab25ace6a0d8e2b698b106e94789d1e0ab00d67bd7731e3b9409f5243cd9ffbcdda4ab5374b9e3aedca37d071798a8b8a31a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed2e12ed537263930e832461691d56c2
SHA1ee4cb2712e70971684b791357fa78e59f1947218
SHA256024d692d10a59da4cabc4eb2cd410119591fda45788b9c8a378d6294231f6fbc
SHA512782c89ed91789d55482f0cb10a1254d234072d5871128c161a4096074b6c00748d0cb7c3822c6f1a59c16dc188c682694454cc4500dc3db858e63a853cd8d163
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b35bf99f1fd92867324ae58588f27b3
SHA1e41681caff5f7540bdf7ce1dd687761c2edc9df7
SHA256583632ec0ad4471388beb46382db3391b34a2891f53f53bd5a85a6c033f66ab6
SHA512f9f109599457622275e2b54a792658217365eb0250e4460c60120dcb2da95b0afe82d3aea326dc41d64d7c062b60f2ae8a450db6e7b0333cdfbbf2f0bd58953a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5654fb6417a440ff6332673a682cee5e7
SHA121a0af02398ef58ca3e3ef110365de152dcd2c9d
SHA2564949a5fe7fd870adb06e1f10760f4f0051e4635d0de03692855bcb752083bebb
SHA5126bda7ed943e4fb79d5111e5756037eafa79a26292f335dd6f5aa21f9cb9ecb5290434053ab2f758eb82b177e3d325243a6f3c00f0bb5b3cea2922db916b76e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b98afd958872ac7f865d883090cf4845
SHA19716a90896bf7955ed097c500ec6ea7d7365425d
SHA25615ce67b8d75b873ed0d198ab4da0d822642551eee4ddea21dff0682eb78cdaca
SHA5129c118366dab8ec6ab9533f27a49b5c606264bd44dc5501f703211ad6b322c6f89eeed69ce009bc95ad8b70aa148340627621c023c8cc2cddc8f0be3242452fd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e47e90f992fba5cf9abd94904f45b26
SHA18c763e7d14ba0a8ca8285179eb4e86618dc25a6d
SHA256b2f3cc813394680d5992cc76e1d23c951caba01bf97b0cd0bba1fc47c6505b32
SHA5124bf4318b261abe171599728239096cd964a2675e5a562729fbb784885a3ceb4e2425df8a89b8bde9919195190b9579ffcaa752ea8b1d017bc52bd6cdf1fae0dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552d6e78485aec6cf735db7627b3a8965
SHA17237a1a29ea7409e62bcb24ffc4fc00f0c270bb9
SHA256778336fe27783944c4126b0ae819e6d8e33d55512ab05440b7cec6e240e76706
SHA512bc1c028b1976e971addba74fcce7e20ed8d5f8399419fee096487bf73b4f714f166c0050f8ae5290dc94f916841b8162cce1dd3a694bb0fe540f0c76f8588be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510bf60bd8712cc97c47f86b99239efe8
SHA143139a3e378c2285abca7505c9d4c35b01b8f92a
SHA256c3c449c0ebf7d3794118abab52fc8a9e807676661883d3be38df9d634b2e6118
SHA512972558a118a8a0b1b015a0c7942212af296960e4551dbd5c760e70005b4a5fea7b83d6f36b6e8e9538776ef46da7319406768997cec5982b5f59d5274bc85856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593217e35d91e4aef605c0e7bae441dad
SHA11f1fb95b801a30746144cbe4b03892f16aad0840
SHA256cf2b66064a6eee9c680ff8dbbbaf95772a59c2d18bb2a1a763b274eefd45c1f5
SHA512f7d34c47bdac665f97d9c8a93391de2742f0fb656eb327c8737ff0c499583eb5f4f082adeaadb14dc6c298438a14a7beeb2c27b0189816096a45304da7f3625d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52897f87fd82cd631bbbb7dbf7beab172
SHA16b5f5069b862a88a14a61407296bba9157a72b1d
SHA2562d652643fafb9d7d7d2453ab71ffef4ff13c6095f2ab0a18c2d96e4278772adb
SHA512babbb5a5c2a530da0020359caacc34106b79bc6678ce170948c43a171130de776d7f147bc3c1ce9a50b691d60f553b36db427e12d3a29f149200a0d0b80f4ae8
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a