Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
com/evangelsoft/crosslink/product/document/client/ProductClassHotHintParserTemplet.htm
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
com/evangelsoft/crosslink/product/document/client/ProductClassHotHintParserTemplet.htm
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
com/evangelsoft/crosslink/product/document/client/ProductHotHintParserTemplet.htm
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
com/evangelsoft/crosslink/product/document/client/ProductHotHintParserTemplet.htm
Resource
win10v2004-20240508-en
General
-
Target
com/evangelsoft/crosslink/product/document/client/ProductHotHintParserTemplet.htm
-
Size
430B
-
MD5
01bd1c32cf943a0a9d5807c355895aa3
-
SHA1
50ebd7207264e8d380af662b23004f66a5750930
-
SHA256
c76ffa0cd1f099ea8717820178ecd4f5ac4031a71dadca97207619fb01e5c1c3
-
SHA512
647a5e67e76802036f0c6dea502b43d84dd06a0070626a51f54ab1e783c87070fe575d4e697ef7e54544c5e011e5a3e2dca21da7f8f41d9340bd0653281d2664
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000480bc85563620a4daeecd3d6d8b04f730000000002000000000010660000000100002000000065ec5d0907e3901398b7eb01315ef5dbbd22de7f34f50976877770263f4782f4000000000e8000000002000020000000ea62feb48ba993478f4d66710b90f420507d5c8de12a5311e5c32258d1e3ecef20000000e8d511b941319b3576d805e595102bc66bbc59635a03d92f4dc29aa0125c7f194000000019e511200df42a729e05f91c4160c76ede7120c856aa3bca269d229034a935fa49e80857c2c7bd82f753d0cb06df93ce0d65985f09e2072719ed10ffe4c835e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0020caef34b0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000480bc85563620a4daeecd3d6d8b04f730000000002000000000010660000000100002000000048a129e6a4662cf02899045b8919e1676476800dc66d1b0089bc2738bcb65153000000000e800000000200002000000061617a8070f61166afa26b35d8ceb0cb78e90d572106ffcaf58188ae070c20bd900000009ca23022546deef4c937145b46945c58e01efd91fa01bec99b750435821b97e0571c7abd5c4bb15ac800fbb45a943ab0479096c58843fd5652b1e3203237883629d533a1c82d718d9287b04877cadb24e8bdf8cfbe39e1fb75ac579abc8d0d32e9d1abbea1b7d690221ea2fe8caf8f936e4520ce5bd168141c4ad5391542412d9c1efe20120c433190758ac4055ac8dc400000008f663cdef646b09415d808fd083569dfa2c756ef126fe8c2befced868be2ec7b464cb9fe7b83e49688ea74bb202a8fa406fd9d12ebae9bd3c96e563e9ff0c75e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B2B6101-1C28-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422976273" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2380 2360 iexplore.exe 28 PID 2360 wrote to memory of 2380 2360 iexplore.exe 28 PID 2360 wrote to memory of 2380 2360 iexplore.exe 28 PID 2360 wrote to memory of 2380 2360 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\com\evangelsoft\crosslink\product\document\client\ProductHotHintParserTemplet.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57904888d71bcd86cd79d64e417364979
SHA1daedc50817f849d4af163e99fd337dce38e18883
SHA2565e7d39cab3913c93e49edfaf0b12e07ff574890c783b841aad8311144578fc32
SHA512d1939e791b7d7eb31269465a81caaeb286d247523c813f8e427043ec11e215f2f5ea273a9a434e7d616d152d896b4fc4fb218154ef836fd75ef09c486b4bb915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d8e074b7ca9a860fe8f3dce6d0b2bc4
SHA11b34eb86b97058385f9575e24c08d3d7f2a6bf5f
SHA25696a0c3d3d1a5a62030ae96a6d37f04647b2ed0b16a3d3299a7a9fe6c79c5c8f1
SHA512467bf88562f9bf7b5656043b5d2fb4799e90fc4c6be3790333fe229276577b4c0fd916df8614e0786060e3a1e3f7ce3761217b17bb58eefac82f838ce6c5df21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564f8138733a854dde7c5ed2f55aec461
SHA15b4f4d25486914024f4a94b7f416c223ab95902d
SHA25689f5fecffd03dedba61c54df14a4153d4fce8393b53b9a538af2f516cd15865a
SHA51203cf023c10e57d5d2e54718f369b73bc374b6459a51b4734cad7fe0c55759b45c9045c33bd4e0f2760bb70ed150af92f3eceff53da3fb9b3791ceab2a91f3f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8d82168f1647c9b7c7facda6804ddea
SHA105d2367a182db1fb09100fc87c18359f2ee2a5fc
SHA256becb31adbb049bb6c7266ce44e813dd01305386ba66269f9c3d5431017c49b8a
SHA512bc8e132045c803aedf3d1f51b875315ed9e29f634cd8a1cbaa0d7a9fcf3c9dea082c7e5cd4ed03fd0e5a5f98752fc98880b6c64a8142811ce2c14313a3ec609f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4b3468b214570796f642fb1695070d9
SHA1d86885c1a07421cf07c2228f4b5c56f21b3978f9
SHA256413fe73c3807e440807c99388ab16ef2355b0d7e66c22fe5fe12c61b25360245
SHA5126329205fcb65a17854bee999b2cc9460df565363974e9965e973a47c1aac91913564659f3b57c209cbd67456d483ba54f053839784808368e5e03033729f005e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b76e1ac2697f7368ac21eaff28feae58
SHA1f88772c892fa87a563bbb0a2bf39c2fb62a2452a
SHA2569bf17596b3fa05ba5327ef1c27fa780e2b285e21f6a711ee69d3d2c26cc378ff
SHA512ad0b9521676a273a5de4c724c5d859260cd6e6c8e92c988fae061d7163cb2db9de0aa6e31eb84bdc32995a43d99f05af2f473b5ee08ab3797e6bbddbc78eaf6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD575dccd733f9c1979ee23d0eba27aae23
SHA19e9a7135271fcd7199d83b6c7617d55f22f8872b
SHA25698e1ff347c0171d37222c42a6e6e6658273d65f6c8e6e38d625cc1c186ffc19e
SHA512b990dc5a8373824baf24937df04d3f569c18e249ac2140d139b3a7face5e55157fd58fae7604e0e3047b28070cb22874714c6110bbbbe7f90a3d7990b80193ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e00a79af1c0334d6e6ce7333c222f14
SHA15466dee805fabb3ef52cba8307292185353df9a9
SHA2566220e5c61a0608a7a1a1d4257ab37a213d4f9f4c069bd81f05d57fda54af0869
SHA512eeec759caa7365de370ccbbfaac25923285c57564e58cf6c7f31820b3a04c4b676ef6056d8534e28e30dd90c7a2340e7080503e91d9d2b72e5bebb55325aec6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59258d42b32d60ca0ee68f359a540c366
SHA1a888a50c4bbdd4e6d46608e42dec639580ee507a
SHA2564bb7007abc70765fc6149bb5c36f2d218407aa5440878bac7a894c607899266b
SHA512624dbcf21f055699d79ef70dff194c257e0bc9ffc549a9c24a97170811e29ae692a17b207f05c8eda6d5018a0211990bb4ac925c39c3167b47c3895ff0ab1d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5016cb031624ebc6866fe31e74f768ff9
SHA1d6f3bc52dba617bb467d6dea6ce1c919a25f7c31
SHA256315c18931770963782f445557174831d9fa8bec8541c3e05fb9fd30b8c0ff589
SHA5122371cf9c4e76c298a95971af92cc62b118b32ba344f7cb5c1860167ea63c14ba087ab29ffd186079fdcc1d3733e084e137c9af5f7593680410f29e19ef978e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55bd63d971ab4b033a4f70d4cb91aeb6d
SHA1937a1a6642646af82b6d633f56f58fe7255c5488
SHA256f41ee8e7faabfc6942e5571c6f0fdd6013fcaf055442cdaad54f0a9ac1d19043
SHA5123f149dddc731fc2e2139b00c798a6297160e01930f9e9c9e770b8299bdac191f1eae0a10af2d5794a1f8da4a975578010d2b892efac05482f0f3ff0a2edd3da9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef2845784a8ceb85c6c2943d3c2fd2ac
SHA11dfe483614e32ea430b0ed45f8070be176d53a09
SHA2567c4b44ff386be5fac25f57e64dc4e5fce4bcad29c537f581511f80f6eaa49060
SHA5127af938226c5cdef69f4748a14235b866b586a3d2611bd2facd2dba9809c2a892bbfb727409392bbdbf3b4fe1ad755a9b21927a3e2ca1469c8d32c16fbd886dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b03ed48568d3f56195e74d459be07b76
SHA188ecafa2c6664724211ffa372c8373cf64f4d33c
SHA256a0789e91971d4bec67b9cc0bf46e979d7f34eedb20b308b18bb5a7c911bbd54a
SHA512f22cca199ca6bf7f096f35709a90580d0a5d0fce46c466e32a8931408938b1b9223ace6257fb35247163a8054402968a7237727c5967fde22453dd1694049c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD563662424a8ef76710e1c50f10b396257
SHA1b28c9e45610533735dd4f5c269a821803986d082
SHA2565175a9cd96ef46087a3476ab1a32e00a4f715a7c999b670d2b70483b9ccdcdf2
SHA512fb240eb8932b5a8b57527b4009073859befa1518fc2fb965ba4e8b00819f700352c3f19aff3c7645414f3788d39d02d9e26143da84c3dcd7e4b4aa672ab81a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5577440639bd65ba166b85ef537daa34f
SHA1b7981cf833027cb2b28136643dbedc65766e9554
SHA2564e6d10337763135199e1070385fdc1d6750a50a01783093f071be8cb9a49a086
SHA512530c5e0ff71a6526469c01df9080612a6b333b2c54d80810e6b83f9eb712e76a406fff1e96d1241ee8648f5ad93f535bff9380647d938286ee0727d44f78dd08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eeb1e2d5d5e80203e05c17607e221677
SHA1bf5f60c57c0721347788da25fca0ddc973fc5b60
SHA25691aea030a7a89ec3b4941c72eb048815e868b3d6243c5a8fe459a1bc364da3c8
SHA512a98c7ae353e0c4701fa7ac550c9fe16293f8c5109ace1f372a363a371378461045ee24164b27c9813b45bf9d1a95183eb617596cd3839521a3e56c626a679491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59798a319a0f1bb0aff95e5e315082fb1
SHA122b7080bfa10ddc41688d66aa354fc339f390693
SHA256853d5c69d9929ed9287cad9f74bd88eb9f1572df63f969676af1d15da299f5eb
SHA5124bbea9e5c538cb6aa2b5fdb653b93cd1c8cb187242f07fc52bf2b7cb3106b57738933ea2b03800128cdb28eabaf3ec295a034cf67ea45431c2c6c5ecd9d263a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5905db0b51be138fdffd62434a496c955
SHA1a0b39bc6b2faf6bdc48ef284402ab977619a1125
SHA2562cf490cad6413e8586447da623d9e5abf0b322cb372bb8ae0ab0cfa392927ca1
SHA5127660374446b0149fcde1f2f949c3a388373d64f8e4d28861670b3c42508667be0b38a2a41a2d9a2427b306651e584d41a7090c8bad5a74d77b7e31ba635a1496
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a