Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
AdmNoteSvc.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
AdmNoteSvc.html
Resource
win10v2004-20240508-en
General
-
Target
AdmNoteSvc.html
-
Size
6KB
-
MD5
af542fb423b05ae7cb226c4494692e56
-
SHA1
763ceebd7af3bf41709473f9bd2b0e3135c6fb2e
-
SHA256
5e4a1d596c6204ade9bd4d55161ba9cdf2043e37284c5b320c14eb21373a74c5
-
SHA512
248a6412dba45d6685dbdf844ab53f2d93d3070598521e2fc81a973c48d37faa89bf975ce3c8c8d379cce6ebf07a19aa5aae11bd50ac87b668c0997f12147e2f
-
SSDEEP
192:oSFNVM9OAOUdDs4JAxNfR6Zm7IDDzibng:6EphIfOU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5063511ba0aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7a0869d0ebad84084646026972585330000000002000000000010660000000100002000000049c4533cbab14a2d6eaf83c283d50484ff5dec45c0bbc542774c48c1430e4b12000000000e8000000002000020000000b01c7fb2dc9bd94ab6f9934359ffe832a87d80a1684b8725ee575f330328de4320000000cee455c3885b3064714f36925dc1bf4ad5caefd9325ccb551b644aa28a53ebec4000000095f6bc9827a088e4447bd5aa35f178cc9fabeec536f64f51810ff21ae46ddcd0573b39dbd527087129532b0fe02ea0bdd5683bdbaac62f0a1933804ef706a16d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422802401" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46DD1781-1A93-11EF-9E38-E60682B688C9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2160 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 iexplore.exe 2160 iexplore.exe 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE 2588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2588 2160 iexplore.exe 28 PID 2160 wrote to memory of 2588 2160 iexplore.exe 28 PID 2160 wrote to memory of 2588 2160 iexplore.exe 28 PID 2160 wrote to memory of 2588 2160 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\AdmNoteSvc.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a15b4d3f3a2668b42fc6472f1ad59866
SHA1b0524cc7373c68c010c3c9d6c4728b7811e8f8ea
SHA2565285992de8bd05bad3d16cb99838d738c50036bc5ce54c584a5e9f766a4f045c
SHA5125f02f99ceb1293d253c576901aa72a66018158853f3ea5213263d9bb87e806910846bcefae1151a49b27af392bb708b989026948cad7cdc0bcc98802dd796674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526c26193a1f6639269d9eea605d2c2cd
SHA1a6ef5b4841cf2b0a436c0437d4fe869930f67434
SHA25660d26d7546190d1f23086f2761e61ec24833e5c32bd1f64e14afc324f0828cca
SHA5128f5d8f45ba67e5af0af9ff003c04a8c0ff98135e3d61bbfcd00a393007b7b253b308152422b8e6d9da484040f738c894517ad5cf5f1ac881c40064cc5a4ddec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52bbaec6dc719c1e5f332f00483c8603f
SHA1eb44917b7e2e63ee04e48ea3b41acf1d806983ca
SHA256c3ad4ac29183e4aa4d5a57f24cf22125469242bbc389e228707bc41c24a9fc9e
SHA512f81bec84aee933b8dfaa1f8c542c9e9b1c7b545a39684ba2ace5c2fe8c0ae284643a9bb1bd5bf4b0b7f955051aa7f6782ccc4cfb17b37ac41131600e9b8870ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53449ed81d17e77fa9205186ba8be7694
SHA134fd1f67142eca89b29e045c3bec16325411780a
SHA256296579c8a6def3f5bd9f7143671399bf41f5500b291ebd4adec3683028240b0c
SHA512a0e7bea14179411efa98ce962be2042fa51f17fc653f04cd585c1f7aacb29d0529d45f82463bf3548d1c7fd1661897ab8d2ac44d99be916da6689a4f270cc169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5faf7dc3042c01d9f6a7b784cec0a74df
SHA1882bf2baeaa452571265e351d1adcbe98d06a958
SHA256afb341bfa5d9b97389b775846ece6439edf0a22f57a85d072aa289d049a614d1
SHA51221582d515310bb67b8bc20eec6b33fc347348cdb22f2725ef31c5808b21eeba8ca329d922df8af0de3e49742b553e7bdb1eb001c384c0802f9105509d88a047e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a1676b3211e55a4a3d852e31e0c9957
SHA1c2ef51c7b20a2cc126d2c8d2afc36f4df8bf3616
SHA256b0a9c36d3ded4a8dbcdc30c3852b111979d014389927587013a2af1d78ec2230
SHA512cc52c086370edb108a32e10731d97370c94078be9bb6f8fb05ad302554dba8fdbff9da5eb2c9813b35e615b25f1d9e8d94bc5f29475af6c699eaed28d8e32e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e620747bcb8c80abf90ed30087b130fa
SHA1fc1f910185e33f24406e6e9754f11169b37aded6
SHA256d052885e8f1833d621eaa423c330927723f9d943e4d5d9a19e1c1892fe0d8601
SHA5125ba048420dc70d25914f685d816cd47f079b8e7270da19e2293964be1b9d09e37cf7327616af8d062c0e0ed0a5d4b4686b179a09263e76e20fa0dd0d52538a28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52479cf59564254b5d9c622873d94186d
SHA1e78d5ed2a5803450752e2bcb288e6a962d98810b
SHA2564f19946f30ff2a8a74f9478ac6ecf92e9f963df4f2e039c5014136a5939cfc59
SHA512997fedd0fc706010e552492635cb22def7ed81295bb086ffd7d8b56a86360927034113e74a16f4d20009aaad8becd6a44491682e0fb0a8af692dad45e795e09d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518f10e9b84473593768fbef55ffa9afd
SHA10e3fd59d70f25b351490a3ea154100dff60d9584
SHA25674e43bfe9e95c1215b18140eb5529e8d735f44263c2ef8c7111a05472bc5f392
SHA512249831f77e238ab82759c0d33525572141dda54196c79301b1d58af9ffb35e0fbf0d4b3cbc9dbb453fe5ce56aa2cbd66c607b1b3ccdb3934bf793448390894cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dbf492f9e834d08094466ecbb506e34c
SHA17a3b9d5cdcf1caf1df0f3d14df053b00f5d0e0d2
SHA256083d41b164d3d0bf7ed86b8af27b9491315f769cbf60652a928d7d76f6f07fb6
SHA512d791cd9aafc54142e69021738fcef39a703f5557b18aac7f8b9cdd996d7fa2a1379c9602d6c428688943666c8325920df8267280f3896bffd686bc7d3421deea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5956fa3e542de4b5922dd87a09dfd1a54
SHA1d549c076028ad48e9a0fefcbd55e02e0289c471c
SHA2569e862592a5efabc2f81c996be475f59ce55321839f79adcbeca34ca9d51aee73
SHA5124442395f7576a288a1b1eb8cc0804ae898ff992c42f3e1d50c6424fb1d5f47275fb62896528f84f7511418990c4fd900be138b10486d60dea549ddc17ac2e626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef09e12c88898c5f907b91bfabfc1e54
SHA185c4d929de84a555f20fbdedbb0326bfaf35cc25
SHA2565715a7b1e08ddde8ef918492d67ab3e0458451e860bfb615e1d3fa93756482b9
SHA5120713fa204beab2764d96b6063c753b6e0b612a96c64033b9fddffdfccd1d14d80351196d23cfc4d4f35566c9b875414584ed5406d7c09cd5f25266741bff485d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee4e960a1cb56034ae2e0647064034e6
SHA1ca3c708395640f75675089b3f471efcd9ee33d13
SHA256bc789f52961c8b90751a3cc69aeace0c53ab715dd820e28f142abdbbd4eb41c5
SHA512ad866ab7c02b994967a68872b48bc71c276d0d819196569d3eff369e88ec71602860c9e95787a98687e2e628c780a7bb91a2667075ae1ab8ea944f9760043562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5191a8c66eadd02440dd96f6a240a2dd1
SHA15d95a4c54378a16c480ececece0eb43801ba0407
SHA256ab1eb66c7ebc39e7160b4dedfc508969f633ff4c0aaf081fb0ab0d0d1a6131d8
SHA5120b5e3f497431471c327fb2695a728f83cbb890a963223b2634c38c8a959e74e0803a3f56970b4e795a59da970bd8de20f5ed07b9dc5e8fa87b627e9ed0edec5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5776ad3a072f1a17d4c0e2da4c1a6fbd3
SHA154ffedb06a1cbfebbd08e94664f9209e1d8404d4
SHA2564601940c6a96c8ecd7b744e97599d71ea24578dcf39ef1bc40cc9ec2207f046d
SHA512d9aa0f662d74b87ca2fc3703a4ea6d7aa251d119d9499f2e24d6c64eb05d7bcd5fbd5b5274d19c7bd11a25d129e79b0aa90d17b2639d792cfd8b23ae9919e41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cce4356edc5fc2b1b43132adb63d384
SHA1a2c01fed10f0f15c74ff620fe32e9f6936553be1
SHA256f21ab89836f96ec11936131f25460ee7ec3b3d8a8ea5dc23ef3a9e08045ae2aa
SHA5122f172c04c6bc9e0210d9994d9c526780f6e2724bfdc9ac148bb5bc3c803f9bc6882ec280e8dadb718b981f905e4362b7a61feb149123303cb8d7f7f6eb636890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f04ab8a7189f8bb1fb4f9e16b10767cb
SHA1bfe333e35bd490105686b55a69311cb0d3b736fe
SHA256422364e2e04f8bfa5124c26986daaf83d063a63c0b9d8698889b6f44fc1976ca
SHA5120872e12d686ef6bd08f4f29bc7809a676f663a615ea713fbc118e208e7c9cd1990f27131cf777c51160165480a2844fb0e2b99f3952dc328d1ba8b6de4a6b154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9a81b2cb85db832606939f04407d38a
SHA1dd0562bb70480511788984395d098139c1a74a77
SHA25619ab018f064367a19e07c3a8332b89d1dee45c28d12038640236596db23d09ea
SHA512006cf1030d7b5b68ed88c6863e49d88b82c98fcb05ba4ec37e9db3c9ec426acb18ee3a337bc6998601dd8bef24a165da223416680b73077f95f0a0f2baee99fd
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a