Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 07:29
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240226-en
General
-
Target
.html
-
Size
146B
-
MD5
9fe3cb2b7313dc79bb477bc8fde184a7
-
SHA1
4d7b3cb41e90618358d0ee066c45c76227a13747
-
SHA256
32f2fa940d4b4fe19aca1e53a24e5aac29c57b7c5ee78588325b87f1b649c864
-
SHA512
c54ad4f5292784e50b4830a8210b0d4d4ee08b803f4975c9859e637d483b3af38cb0436ac501dea0c73867b1a2c41b39ef2c27dc3fb20f3f27519b719ea743db
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423043231" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40bb84d6d0b0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01F0F8C1-1CC4-11EF-9449-6200E4292AD7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000447c3f2b87b8b36a04e028e180fb5f65181b1e20ad1caa63b2ef54f2ef2e81d6000000000e8000000002000020000000bf86f80d295a63f20f7587d8a5c70d8faeee93a02b6a8000cd79fd35940d94472000000045474b62a3bf674443c870afeef3bf743546a331e788d6950bbd8318fa895d4540000000e49bdee08b6f5fbbbdfe204db219723a90b87d0115cfc5fb012d8e05f302403d58f5d89b2332ff2ba9871e9f1bde8f2ac4a3ca1180e0bf08b9864f5a36d56385 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1736 iexplore.exe 1736 iexplore.exe 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE 1744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1736 wrote to memory of 1744 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 1744 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 1744 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 1744 1736 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1ea1420ce7183ca9a9aaddbd62d5f2e
SHA1bb3f132645bf086dd18932872f1d95b44557f6bb
SHA256028ec61d5a369d4411b1f4921b097c8a20366eec91a6c513f91d055f3a9df6b8
SHA51247038430bccf06f727bce243a35bb7239cf946b2870306bafa1e3657c77650b249bc02cdee9807b432cc03d530f7106c10e368307f3f685833cd30ee5ae8854c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b3d51f5ec74a23a8c74b24fcd7bf91f
SHA1c337c4a241a9749ea655505823535bcf45b8cdb0
SHA25644c535f84308986f8df3693c887d919d99c269cff3b46d6ac1db5cd4ee953234
SHA512e89d402e2cca3bf7459b62a207dfc56580b499765efb93dd3047e1f601b4768023f6105cd0ccc66b89e03be00018b4166baa6244d2f339feca5b29a704008288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570b1d118155dbf12131c4fcd2662220a
SHA137c251565d4ab0ac9dd3b1c6e35f1da3b972d365
SHA25658c4287078ff12262b9399908f24935b822af1b65208095d134683537fc9d7f5
SHA5122d7c3f6023e3b7866fefb59eae6b14f8cd2c68f7057861d59465dc082666db46a96ee2d4683fbcc511b0d103c96bccfb62e7d92ec2a230214a54980e8580bcc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD506349578bee003dab56d53e16145eb3b
SHA1cad914e242202c1d045f336ce12b2557ff3ea9a7
SHA2568ed912c4010f5f634b4ab4313169f4d5143365736d5d36a28de811e221bd21f8
SHA51297d03ad72bbe93048311a2bd7c54908122c7f486395e7ab3a67536b0e6ac915155dbeb58c460246ad5ccddc73ad53a0662614512c53b57aef7e8cad74bcc7e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f8d4a178435bf445769d3941cf08350
SHA17657e5bafb7f6fb3ed141a786870f35facbfc3d7
SHA25635b49b902a9795677cb461055a3c2f480ae56ce49958261ea5920a408500ab15
SHA512751407397ebc34c5ee61eacb47b8d4a5b9fab9af8bec7a4da39c56c6472e2ee5c629067ca469e93a305fce97ea2647aa88c42c4b0b8536e02474e902c1f43b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af347db734e3735ec187c3263c9227b
SHA194e44ceecbac6e70d15432ef81527c996aadb473
SHA2561fd8a8f8a3adad1a3dc38723b2314518caaa2ff16795a0699d274c5d7bf18cab
SHA512f9a242a4f8560c241dad3da91c397ac80a07cf74c5cfec9bcf8f3ed658987717adc72d070c94a475d1db9ba14c8aea9a6ae03cbe935825e275a059a6f15c9830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edf3ddabb9f1329db67523d7767679c7
SHA16c2278d27789e19a91ffd0f53a8f15456438b385
SHA256c369b6e524e3b4eb17a4b8e5656caedebf5d083274fc59cba35365951c6263d5
SHA512d2d6a3b9d9bdd17359e6c838116221f81a35e125507ef0f7beee6c14346c64311eac7e8b6fe6683517af0005ad7ccc4a3a569684c682462d6ce70bb604c04a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51008f6d038e1db9ff2183cf5c950efaf
SHA1ea15731b2b7a52b8b9c986f0ba12885ba58b9f2a
SHA256705070fb21e2a554b05c39d793c75d9dd21031987c1edf90c721c38d784432b3
SHA512adb4add3c774eabeacfcc80e5c2090ed74a24fed10881934314c0237b8d2b1f74e0c5ceb4bbb0888136f08f6bd4a0847fb171ac86bd97b5ca027bd398d9416d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f41859489977b39d3074db98f04765e5
SHA1c408de3aefa810b084e64ffbf1bfed287cd3c570
SHA2564a2bf5e2f96e9ac172f3c6fde4e3e05dbdb8d7452141ff162d99610f729ce41d
SHA512db8c5cf3d32eb28d0ddd7b24213a96d66a96f04fe422fde75caadf7b00e13f2dd440024398f28959b58ee8363e4a3aad29cb4b66ac4e8747e3527ea4f8759771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e47814af63aec9e1414e51b984b0d76
SHA1d24591d5a59b997bce82f321f316fac936c6c130
SHA2565578ed69f57f99de4150d872dfe0445bba4382b901280024cc5bdd4071cc8928
SHA51279b4a9a17d9dfa05718c5a26ded45ed18c7e9b7d2765df6fd1e4a60d9b6e73da8fd2b77b92ddd56c5673c718f8a9bb93b12488dfc27b3342cc4ebe92b5ec2e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a35a4ce59282657ce6a453e98bb7dce0
SHA1944a81f86dee6e109d432d6319eb2492dc82c753
SHA2566dbb81aa7ce776b33c6cbba4c882eb7e245c3a184b882b32948d6cd7963f04e0
SHA5129eb6f3abe54542e24fb66a83f9254448c1efb72793f590f0b8f150b09cee77c96e8d5fd3f1a78f51fc1d0338b02b18f99c1533ba1b06fa6d3d527044a302b413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56275ea2f0d7834ee47aba4931c243193
SHA1af08dbb50c03749210650294ea2a6cde61980102
SHA256b47fbba901fdfe6e4db1a9feee982a7117ffb6f4ffc79be720800a4463744eb1
SHA512774fcfdad2550664847395c4ee5ef24987ae66580ad3a06b8481c2a92820dde41cc1c9a713ffaf131fed9a2bbd094ce2b23fd7f664f0be3eb10763b033526dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c856d1548a532cc8a73fc5a7b8333dab
SHA1f0ef156f0263885d9849ea64b0c79004b50f7f33
SHA2567d0348d419b9ca3e42bdb8e94bc3e39dc34e4d9c92efca97a7bd7f0c7c323bc3
SHA512f3c5d4d052f721999a34120ea2b310cf7dd631e213a1cf34673f356657541045c60f4cfc1d7dc9448a3173553e85a4b0bf3ad29eba8578dcc7f8c5a66a6a5e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ec0e4090d6e2e923c92f8fdb50a2b44
SHA1402541366c9044f8668e244ad0c3491ced982f8a
SHA2562e215db1a6cc4f4743fe65fd36abb2a736479c8463830dd4a0ddeb7fe051ce5d
SHA512f6db74b6a7c3d39c039b63420a5dd833ccae72767d946ecd47949a12da371daff0ec907c5fc1a133931867615a286ffa33696115e465a92dc48ed37050e05b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2705c74d3a501b06f5b6fca81ed4e48
SHA1e636482aa6b836e626f76314ebcfa972312de1db
SHA256bb077586ddfcfe4decebc082f0c631b2b0df9f0af846996b2d79af93b6da800c
SHA512127e402c8f32293f0d7d961732bab7efd33dab5c5def326328da1d8a4fb170f9c1762e2482b56af4f31a6192138fde6e40f8530ffa95288b90d43a86b1c88d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f216797d8bf834ec68f57ec86ccc397
SHA123a5bbdffb84e8bfdb0d3c7957a1f04b97ca21d5
SHA256ad14f8bbd4f68e06b70cc5662c794eb5856b15bcf471d1cdc3932cac856121f3
SHA512c84f636b11b4e2d8c943af0632d9a5c1968397a401a144129e3a9fb4edc60386d234ad23ef8532cf7918812ea058cfe9e179ff7f845abfa8a9ed3c4faf52c3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6b3984cd2c152cc470c479458a207f6
SHA189a8332adc9768b3569731ce8f597c7de879921e
SHA256257216bb2b56a361f853e44478e7d902b0aaae06664b55ea644b8d437ccb80ad
SHA51262238212fe52d3fe0dc848302773d0923b5ea7f831dae81f0444fb5b2bde6e58c94737a5039c8b9d9b4e9d5993b49159bcbd2ff197b51dd20ea7517ffd9d5c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564940459f23f03ed725b9e24d4f05e14
SHA17fff60b53ead7a0f6b072cfa4d8c3998f477d08f
SHA256ea04262ea714509bc29c33d2eaa380f0c1a5dfef5f8dcf2716602aa52ddbd3a9
SHA51231e3b028b6127033caa621a188a9b82c5ed0f7fd7c9b49bfae903d558c3b7dcdd487ede1324a509ff81e2f54e28713844e0684a7e89aaf03911dbf3ee54ff4c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc28e499622ae72d9fbd57b406620e3c
SHA1b18ae714625c441464c7ee58a1e98ffa740abefe
SHA25699e7c6929dda824cf2dd031758ace4b73709dfeeea849660402c33a21cadca14
SHA51282bb158766e7d9ffbbdf2849c40d2e6df491c1a51eeb01192162430f7c69f9bac864f52cceb57821d9cf5be5255c87ae4a680fdbcf266701f76f09887abd26ba
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a