Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
CerInspector.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CerInspector.html
Resource
win10v2004-20240508-en
General
-
Target
CerInspector.html
-
Size
4KB
-
MD5
0f2c7271caca564b79e379ba63bbf937
-
SHA1
b03d83dd642161822302136e637722711754951f
-
SHA256
ee06b1dab755b576180b7fb3bdd2bdea520090a0f7d24c6ddb65bf24c7c086fc
-
SHA512
5bbbe64e2d3b067648f3e99d1c89a94c51a5e5fd626b8ed03f726dc9951e3a976dd6e0f6e555a70eea3e9b24d6b615c000881600cbb5549a5dfc593ad3f2f903
-
SSDEEP
96:o1TJBHBJDJgJLJpcJhCJz+aCJzkvJd1JzUJcJzLJgWY+afoCFREyRUswpL:o1FNVM9OAOUdDs4JtYhpnG
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{07EFFD01-19C9-11EF-825B-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001c8a94a448a3554e93961ad0cf8c9a5a00000000020000000000106600000001000020000000135c3a381df80f94bbd785a1af8d915a82fe5a57fe611885dc792f34de05feab000000000e8000000002000020000000e3c3b0cc470012f13a30a727da054d305532ca04d31d55e296acaecdf5a277df20000000c3475dcca530f087b27ba37d39b4463fa5b9abd9f522d399ad39e2ce799c943f400000004f12eb71ab14e33ff7741d376415ca0348330f372c9ff058689fae509768c32479d8ccc127b761c644b7d7eec737fc27371049e43bf4cb29feffc1427972fe65 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422715536" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00287ddcd5adda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE 2984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2984 2204 iexplore.exe 28 PID 2204 wrote to memory of 2984 2204 iexplore.exe 28 PID 2204 wrote to memory of 2984 2204 iexplore.exe 28 PID 2204 wrote to memory of 2984 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\CerInspector.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c8d2d76b901bc03483547696a27f2a2
SHA11101af34e6555750c65ea7ab5ad64114086c3223
SHA256b0a17ff52e1ace5edfe1f9a3bef5074c4782c6ba3dc367519d37c5c6d4972287
SHA5123727855ddd6de427959f2488fad3545234a3293f2c8b79dc4097ac7238ddbb0a3f358b1bdc2661ea7053a737ab7df0636f629f9ac8af1e3cceb585df47026743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c12a73d1458edc85698f08e0eec9e612
SHA18c91a1e1ba9e3836c352d1f206cb764469c9ea23
SHA256d117cc892b4dfd474cc3f63062662cfa59603b4174dba3863705e298b83805d1
SHA5124df2f41106f318b0705b0811c355d4669c79822948c3520ef22dd5965cbb905d21bcdd7a5c65e027d92660eb880b4404c01cbaea1a073a4fc8d7d06abcc924ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54369263259ce4536c58ab98b7c71724d
SHA1509a31c5b352519d82ea9df1555353340a9832a1
SHA25670d8a3ee5fa0216025309b783ff814d7bd82ea54b9a67c4099835c6ca08fde99
SHA512d74683173b91823ef6782560163a590b3ee27c7396fb2b5bd2c8e86a81ade782607d85557eeede77f84872a7c0cdc2dbe9e757e5e90bb1062df4428a3c59aaac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d79b39639ce999b09bfd27c4df60151
SHA1964189bf46d69fa4bcfdeb4716c698f6c1974139
SHA25682d9def9aac2d6f7cbf064e1e9d9dd8dcf87c835f9337377c47302a8250cb8bc
SHA5128c097eaea7ceb3386c5517a78c34249d88ee5d1c9525dd1f32a01dcc0853f51208b51b94b2f0f3ebe6b0405e60024294d8f3d2fba8bfe89f4850cf0e4923d7cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548dee91204242ed73105106552bb2c3f
SHA199251d8027854a2ae069aee5e14f9169db5fa0ee
SHA25634558cf6ecaef4273a587c162021e67d30f8a5cf6647cf42f4e5576a55f778d5
SHA512178d6f4fcd76d3cfc2da5bbfface84fc7122d8b21cfbf7af86a15b80e5e1cdf3fee83fa81f0572eab88b0dca61b5fd9887c8bb902b8decdeb42fe0edc4b4f753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529f9b9b2192924c0fa0eba60a22df0e8
SHA141dc646d34b304a7bf0b7ae7c7029b176e35e4bf
SHA256ed969273a2ba5e95c89936201ead19dd58af90be3978b0f35a6a5ef6a43eebfb
SHA512e3fbac52788bb447fa1d7dce3ff79078a60ef45938aad95c6de0cf50598d4f256d3a32438ec2d86999751b3b2fe01a2f8e934c67425e7e2f9abf5708918c2306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bec7bfd6517e355ae31978a5f2e3da68
SHA1ad2f071524bb17b307aa38081a625d5a70722c54
SHA256c6721c99f3a75f5ec3bcb425f3c331979e452e7c6fc6f608d3415a04f7ce1813
SHA51256bf3fe15fc00977dc1cf13824f236eb4bab309c9d0629b41a537daa41e133ede2a4db0fee4e9b7dfc5dd9455d99ad162db156c8e7feec94430608885293a4b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57927b07c277aaba996e85b2d71ce734f
SHA19a2af89eccb7d8f4a76a1ad5a4fe1413cc1917d9
SHA256e44d406133f81ac0bde6fa81f59f2e589ff12e15d83cc41af8ad6471df909d53
SHA51237bc1bbf0c8d6c784a6ccc64bbcd37d6179d0033e66f4240d108f9a9967849f1733c817e4eb259d41148140a6b014fee6892543fe72b26194558c5318fc56508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5096ebf57a8a46dba99c31d77dd225c93
SHA11feda675e27d33d4c0949559c05647ac2a184666
SHA256bd544b0b41f0a5fac8e03997564ef8f1ac77b80ec89b0ef5207651f48c7a97f0
SHA51215982677a4d03666ccb74066076ac7890a80f06871f3f1033a2d2f78e7b37b431c580dc411431d0b21d60fe021f33401c5a321028a7acffa6fca3a6e3d79ea30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54510a964d53628b3d6f5634635d7b677
SHA12ce66985c31ba7a9cd175f460a3fe1fab531b769
SHA256f3c0d010c2bbf5865439959e72217a5889bca2530dfcfae3d44ff863c53458b3
SHA512ab12d82771ffef7ad79c2826400888b5138d1980850ac6d64088771982a3c8af924c197ebd76917f58ad02e895ffb3a9f74cc5b9a16afaabfaecc9cdbb0c7c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2125ebb8d93aa0cabd87cac175b269a
SHA1ea604a629ff5e75db621fa5fd1f7d6128f406053
SHA256c78e9ea3f5da990be28f004f5e134b07bf4a20601c8346b8afbee7e8da6b416d
SHA5129093e74603edecae2e68bc9895a298fde2f48d21bfce51bccf8f38728d50e1f74afdbfa7912123532daf921d4e4986648d3a0a9d185ddecbb8ccc78aee580b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fc048b933de6fbcf404cc3ec5f70552
SHA10dec592231434c939fc354e57ad5cfa35fb74d5b
SHA2561f0a9b94f5bd9433d32dccda2d0b124dfabb285db9cf5bfe0188017c880b67b8
SHA5126f0d9826697d8571ede9e6ded5fc47507907beb2a3d3e80c9540cabf1c0bdfe24b95197e14b5a642b3dbe5578421073cfd2ae3df42b994a9ea583bff0bd7c977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b1d8c1bfd1bbbeecea8c395cc9c5387
SHA1cc42c19064774c6c3064a058f1e3ff4b10acbe6b
SHA2569c6b27054e883d4147ca36b31103b06ad9e311e3e11758071748c3fab67486a4
SHA512cd121aff414e08a545861d7886abbb7742613a48879e1adab18ea0dae05512882f5ebfe7fd1b7e2b4058c9cc11f9e7322d4956acd08d8f08571d805045997b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5401f50ab7c4d2ae1497d000664efe970
SHA1503153aa25194a494b2074685fb1c18e4623f8b0
SHA256a75c591ad07596234a6efe143cca126e5bd4e5f865ebe626e9992159ba72c5d6
SHA512a78c308a8d2e2d5f451d3a78ee0620943edfffae955825a30cc9c9224e0cf972e8df58c55869439e6dd0e83c865c735c5fb9d17fa5efda7a4db396410601809b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cbade365efae9b06fedad6cea2da95a
SHA1e604882a60cbe39ba326e6f3f8433aa01de71b57
SHA256a7ffe293ee25c8e8da1d597cef1910d7136fc915876d7605ed081f30e7ceb63f
SHA512e82a035c6a6d380c1e2a39526b5736fa6410be05fb5ab41faf1ccefb2abfedb6397019d8764baf3ecb14ba9432bbc241a7e1b8c36db2cd97001b8e6e171cd6e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5305902c4457be03d74e9595c72c43d82
SHA184f3a6384188a7cc9bfaeddbc9644cc2638b5ded
SHA25658fff7a0ea5e2404c04514f7a1f2fe67e0fbd2a2ca0765099054908840d3ce14
SHA5126f589f53696bcf2fcec3cc788aba8150fdbf0b3992c69b995c02dc0b9dab64ab39a49a01013e6c3a9bb26999ea8e1ade594f4dfe8be909f1c9b676d90cfb9440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576f9239cc2e1f5a144f40847e4ca0180
SHA1fe25aa57e0ed90c2e718e8f02397745ddb1b0652
SHA2563e8e35832faf42b2d477e3884236a25d214f584e8e80a7e554ee26b29e7b3b8c
SHA512cce6e80c70093b45c5843779ab9494180e0819e4142fdb56106c1626836383a3274fa09151659561e672a8e67db321a4b34a330cf622ef82972c5355caa1f43d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5315721c1fdbcdd5403934a630687e51a
SHA1d3e5fdbcf5fb31f53634f0799d817464fd9817d3
SHA256a3f11f9bf317aa944efd5d8e819ff8671a7fb1bae0b7c452529c15f276a543f2
SHA512817c225caf1381aa2c196fe9298e355829882b3abb0b5046f27caf079740bd933256ee08b8a2712b9cd22b9bb8d25b8788e8af5573099c718e6ec88164e1396d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a