Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
WorkshopConfigSvc.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
WorkshopConfigSvc.html
Resource
win10v2004-20240508-en
General
-
Target
WorkshopConfigSvc.html
-
Size
7KB
-
MD5
369ad00d4c84e38c0ace8daea1efd5ec
-
SHA1
6585078af624a22c37f2ef2b8a16928b126f49d0
-
SHA256
c100e9ee244cedf705030e198dc3bfcd1a001edda4de7f0c399b755bbd2f92e7
-
SHA512
02fbca9991d67c3c621c545eb754312a644bc88151d6c2be538f3a216db31d2fe8f6995233fe3ae7a10dbdb065788778f16a60c601b013a47601a015d4c9d6bf
-
SSDEEP
192:oSFNVM9OAOUdDs4JAUeRnxTeor1nkSJaGnn:6H4xC09nA+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422803463" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000085bbbe851cf4157688fddce9f9026173c137e490d22023c2ab21eb658aec6429000000000e800000000200002000000088a03bab28cfe88ccc3dd32c6a90043508baa370239ab31234cbe48e893bee3420000000e53e1171cb8c535ed561dabf3b30a6ebc12eab973b41fbcfdaa6a0489e6772be40000000c5fb8995cb38161419905ea327f9d853b5cbf24ddd79de710dd447eb369349eb30f25fb9f7070c533eec80daed3aa998a9e53ee23ae7f05290951b54bbad4025 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04b1b95a2aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C07A6231-1A95-11EF-BB1E-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 348 iexplore.exe 348 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 348 wrote to memory of 2584 348 iexplore.exe 28 PID 348 wrote to memory of 2584 348 iexplore.exe 28 PID 348 wrote to memory of 2584 348 iexplore.exe 28 PID 348 wrote to memory of 2584 348 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\WorkshopConfigSvc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:348 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c61d7d57a86afe33a679aeb56a32c1fd
SHA1a764b34b54a6b9d953114e0d05d104cf457e63cd
SHA25682d34c6208eea96ac068e3e286c40ac0bf8f3e0b4bf34766f3573d22f8490ad3
SHA5127d5e4aa1606a1d18d1bb46b99caaed3b6215e3e5bb16a13705e2995d1c433263b1b945cf86ca7c0a91ae671d91e0e66ac6e41365b071688020ca49c8daeaf7fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a3599c708d07dead81080ddf72f10dd
SHA14b9539b1afdf8196aeb11262309a250e40975443
SHA256f618c4b922622beeeb202df1adf0ab069e63c0368c46324437d8cf79a3ae5ba1
SHA51212335c991109eb108e1e377f536e38e262b07405b1eae3df725480b6ff8dae56f9cf1b79c6538f5a8ddeae88bb47ff7ea9f05f8262c70109b973da193dc50fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537d391aebcaa4236c4bf572829704094
SHA1cc578de0ddd96ab5c359c0659bf628e7883c6247
SHA2560b5113a0686c0a8f3eab4d94733381949a78dc6bb19c2cfde7dae6f7f25f36b6
SHA512741ffaeb6fe2201a1dbf0ae06c3ed3c06f2b915a501031a6e3f0e9bf705253386f92e3a3ef90c846d75649492d3b53d21cada3ce6b03670421719030a0fb4a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c40f44d4214753328e3f405a8138612a
SHA10d2bde69d66798b6f091f07d7701971c16b7fa35
SHA256844552dddd3ab044ecb961c6f6edc36c499a93841c90809eda83814534af4197
SHA512153d5fb46b05ffd72e2be394581382ed353e08338789f94df401ca5d6a19b8f9e9e8a57674cae95808cb6dd27067a7eb0e98f51fa63b20d3f8f3524b685fbd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5806fd9b25ad2067621db211c67380ca6
SHA186d0f0d13ea442112d9b42f1c88382332789daef
SHA2564d789cdfe8c3d3910dbfaa476fed7d4822067e910148f6191e8a882aa044b171
SHA512400d5c92fa2e7ec90f41e93bdbd732f28cb3851b4793627e7c98aca71926b7a7dd162e41d3cc08f7dd4513d57f8c1cfeb9b4c1715e19f71386590f4b2bceda99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d9a5d6d40e0d70efd52ce8a218cd314
SHA1c82f0c4261a6fbf2c7472ba3fb84e52fa447f97e
SHA25682018ec0594cc1d48b3b2e79a85a7097aaeedce155ac630567451521dba260cd
SHA5129ad4beb2a39157528ae8b9afe6a4e88de836d1417a06e87fa5e5d182b969913e3072cbc79263c9d0adaf2776fa9df2e94b53f69f73f2be52a81ea837a9a73fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0d2f3e2e5f0f77153b4a4fba6279843
SHA1fe117816ce14a6e88e7856cd403ca391c4d34f56
SHA2569bd6bddb7df538ceb15c14a1b4f0a6c28e9a02d486582cd3f9d02b32cc5c042e
SHA51200973b20f6063813aabcf67b23e44115bb18ce97164536609820d5c64653f4242cabfb5bb0e95c4f39294e9b39b0c82ca2ad47517e364466e5058a07ff0f712c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c3c02f152cdd321153ff53cc3fb0f01
SHA1544fe99089527e19f6751ef59aa8b94310d0c12e
SHA256e6178b7827bfb1d846c1ff2f8defe12520616350f0cdb5e72f6cadc196ac109f
SHA512dfe6fbad11f801dc37215a0f4c9a38f1a8998cc93c55c7458b57b01abc4c5c1aa47908ac250c1d11f6d423cdc6d76e9d91332ae649a43fd1b2a02d297b4cee62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5519eb8cb9a5217aa68a62f148e2707f4
SHA1122662e215c0a26f017378fabc49bc74fe3265a5
SHA2568a848870789677d1c2d3df9f556aa907cd85833f03e80654e229951bfcb6dc6d
SHA5129a5bf3e5b177cce5295b920129fc3a1e6df110e012d2f2201809ee1281689f3f1a77407c81c6612de809365363d459905d8695fe6df75cd58a646bb651244503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57da40ac2924bc72cb468bb4e78eb232d
SHA188e84133056a1c91879b46f156c86d17672a3bad
SHA25633e4bf2738e85ead8c3734a4dc2432e16ccbe37a55ca52b739036fbea808c062
SHA5121039c25b1d87d0ca751e5457e8a05fd4f47a4f528693d5df3ed37c9c4cab1834608bd620ae150491dc9fadfb3141ad8ad62ce223cf78f1bd0188ea397d0db36c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a35340a7c373d6c7fff5ec02f95b6e8d
SHA18f3cdabf03530ce063f5617b97f3c9ac08f50a07
SHA256ef9887fa32ebcd383a89e815aec77b4eb133b00203bcf6bc77eab01fe5344416
SHA512e3b2b8f13834704df92ef26989003e8c6019492819d475fc84f4e7d5e69e628c8e08cc3c4bf53badd6db9bb0b5071b7b39655cf943d47f4853fbb95e578ac028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5c576d88339cb877f981914d8950394
SHA1adc068431c59ca2bc11f8d7ed1cb9eef161bbd85
SHA25675e2db2d88fc031a611b33d3fe53502f59c40c32727e1e504a80bfc5160cd809
SHA512851dc8b89c2b289730c9eb36b9dec6aefed6ae0c55b442750f26826d208f607eec1b1c83c8492b304c203b8dbba3c588c1f2fb5322c7f4428ba589ba1494bec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e5ed57265f203aec680a86ba62765b2
SHA18fc49a55728c21f0693579c267ea848200a9970a
SHA256289010597724134d70106150ebdb30ec651304190bf8a08f051baa11cc570944
SHA512558b225e893faaba76a91f40e99f119f479f001c3cb36af448f5f7d7bbbce7f8bbc68d51a2b284fc2e55455a7a0f4608ebdea920f2561c33be27ec63b1ba0126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d17fae2147d9ec83fd90f7961f921b41
SHA1580beaaf3caf81ae415cdfcc98aa1369557bf52c
SHA2561d267b621d94200b60c28c6311a1fb7d40798d1250e7b54ecf613ad718b15799
SHA5125618bc8862dacafcfa93723ec05cafa5a64b21090d2aada4b67a5d5a140213c474f39d81c15c1322e93655c80e80ac9b111dce8de87810eaa9c20182ee72b12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d45e6537864fe981fdb386c92e0cab32
SHA171a45241f303ea49b0c9c73f8ed06e01581802d2
SHA2563e04748e092c0bebeea5f36e24ed52bcfc72f8763e249ff1bf491729893b3365
SHA5127b226d0d9e2902ad8051a8288acc48ccbf0e4075126bca946ffe261e3c22e1ea92a0f5d77352cc930664070f4450fb31224d324414503a7509825fbcf436425c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20995501a6b6fe48038359a0230149c
SHA1f087c0715eb1e928b654154ec0fcaa312e335a2e
SHA2569874726c82896b41315c6c8bf7e0cf01ec7f8986f9858e35a126fbadefea612f
SHA512821334a94cf24104341bde0587d046905be16569aa16594f23f60d37b937182c9d28da660c3cc7efdc6c3218baf30319e6bb85938287db7b89968d917f7b8feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54285a45cc0ff0aa366c8966dd44b669c
SHA1b7256b37ef5e68994da33d04a17abeab9eb48e0f
SHA256fff63d2d2a32cdaed9823c4afae5050724bb403a96f9c1b22fc36475f3a88cec
SHA512b4ec5d3bc1f27fb1e0c540845f92d1962328c07bac5c44a5448ac5bb39b4ae39e59d68876a0c0b605740e3631e74bcee4cf2006ee519fdfb2852f918ed208e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53991f4656c8f40ea52324862bd841bad
SHA125b3691432d55aaf21ce178e6d91e036111e662f
SHA2563cf91f6e83c1ce2868f89b375c802de7d60dc7f258153f6f531c5c70a22a2789
SHA51273479f7656aaed1a30273afa3cff9b5d3f9187254611544e50e9907d217117eafd89feb0a416314d4ec3e26e20502403ac6768b7f51268624e5268ec8f1e07f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545108842855c388c2bc2cf8227d1dfef
SHA1b85e8054506f91d9a20541689cb1dd83ba414467
SHA2568209d7941734ed6b498c74652876ed602168a5121ad37ae1fbb3cc8e587692c8
SHA512b37bab43a271441246c5209f4f98d67490a1068fb59a7f646a00b6757f2b98b04f714ead8361e4ddab121e7839dbea6c327b7f04631199316ff5c82d8cc1bf19
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a