Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
secure-email.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
secure-email.html
Resource
win10v2004-20240426-en
General
-
Target
secure-email.html
-
Size
578KB
-
MD5
334cf20e06ae9081126fb2d000730ca5
-
SHA1
52339debb6471051628cff08402637a94eac9452
-
SHA256
42f5ba6e98edb2038ffd51c954cec6d38158f54a555e3e068a7631a9343642dd
-
SHA512
81d839c45d6d11be375cb8aac141d2f8a29ca9de746c964ac727bbc6b6ba5d33482c09ea422f779c5fde2f6eb655a4e382a790a025c5fc04952e15f239f82512
-
SSDEEP
12288:sObEHevIWozQXXLQ42yKdlmhE6N3Htez19/:DcegdSQbldlQB41d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60430810e4b0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32895C81-1CD7-11EF-85B9-4A8427BA3DB8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001bb0510d5b05114f93259e0416306686000000000200000000001066000000010000200000004a19489528e5a48c380142192d60fd58821d0941ef4accfb886f4ac9b714a1ff000000000e80000000020000200000007b778eded495b40486303fcb3613bd0d3d8c3e1bd0dbf13773077d769eb9256320000000958ff5bfe148826cdb2a9f9dfaf7b3c67bb6963328dd501da2ebb4c43ebac947400000005afbe8fe4aeaed441d6a5b46b9f17604df5adc9abc9c9108b22e7ba35b4d7a38a1e947cc31462669cd40efc0c6ef4d97eadf440e3c4596fc21074f770355ec8e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423051474" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2172 1948 iexplore.exe 28 PID 1948 wrote to memory of 2172 1948 iexplore.exe 28 PID 1948 wrote to memory of 2172 1948 iexplore.exe 28 PID 1948 wrote to memory of 2172 1948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\secure-email.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5de9818845ee100f992aa45991675597e
SHA108868cc2e5751851bd149489bbfbf56721683f63
SHA256d2cb693cc31a633638a234a010f0ef847456b454df2c5ca33d2791c1d0f4aa5d
SHA5122fad5dc7cc2b142c981e1f8b4aa2d74e23b658bdbe520a3eceb140313da83831ed9db72b81e5e9f722c29d4ad60c61fcd88a3aa6d037c9b3de247be1c72fca8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e6fc9867d6fc918cfe580def259b7bf
SHA10529cbfe83e365e8c77ff9877e9640be6a33c692
SHA2569aba247bfb2562140fb91502774bd4dd5d54e66a12f5ff270ffd9ce516530d76
SHA5126e93b43166c70c16076e306a5eef42959f5ae9e056a0b5836a234e0642b8f3189aa3aa3a8a77718a149801917f3e2f0959c5f901454f143fabf5ee5fd0c3f2c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5781d2d6c31523f00e352a176d0ce2fd9
SHA1a62290995acdae92331fc067ba4d8fa19e6f19f0
SHA256bd8758c8e6298c076a4ad059e291adcc8aa3f21bf6c39be04ac766f388b9e0d1
SHA51290622e751b9686316413a3a29575cdc319318cdbe943cac8f2084530a65530870c48d97a1ac9448e4c8b1231a538d525f0de728817b9fc4faf7988c3b57c9af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53e4066c89bf092c68e5b248fa0c2275e
SHA14ce8a41092a1410f6b0daad471bb4f3fd8715340
SHA256dbfa029e0befb1003e3498de353c4504eeb3e71aa2ede0709b21401dd8218b35
SHA5125e909020093d752f7d4e7abb8829b2dca42060a2b15d9c704dab2060de9a7b1d6942dcde2f61a8a027a5d077145f9a2b891ff2419a54603ea75b1d7e7e8066b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a642a1bc22f00c079bd69cba443bf19
SHA19eef21bc3ca9982c3e16a168372bb92c4b573132
SHA256d23f6c3468c90dc87d1cb9912eae6ab5fe7ce6fd198e0e1d8bf03fe9b0d77776
SHA512cf4abb2601d3b0a2dd337c23bfbeca6416e5386fc63c5591d3d5cc814d287ff47e0fffe25076ec21b42e1551e0b2d190bce64edbbf517495d249ff3403e45374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ebd8f277381373851fbf450b06a234e
SHA1a19461975942e9afdb423b869f37d85ee816f573
SHA2562a45b022c5531150d2fd7412c79a1ca27eacab5f230b2824153cdf2ba816204f
SHA5124ae08738bc79ab7aaae2b4a7d1551343dba5db2ef9ff2d42e723552b4a2dcaae1ae4da7d2bbb7ea9e1458138ba0ac6f71d2ab4b0a8d981d3dc57dcc399f9d301
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5433845c7b489b8ee5cd2bdb0d9a0a617
SHA17f4c3fd09c06385b8c58f6e72855083e3b4072b6
SHA256860d3bd0bc7a2e14d271a5c4f58d65290df913ee9af0d485447f3238a6ca90c6
SHA512b0d0b53cab6ee9047e8177d35cc5db24d5e73970ea1f860eaeffff6652e7de52c9edbaf9f619644b70fc15c345ba442cdb3a74891dbdc2c310d921796663c66d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbb98ee699b3809bf39d2a2a94fe846b
SHA1fd00c75144277f12366e3e3da845e9f7c48c7702
SHA2562df645f1251809b39dac32e025fa45464734169a7af33b6a77012b8a1e1b6e50
SHA512d2c7ecef0949918df476e035b3fab417c0f70a5a07bde24fe4d4d9cd3e00910504e4edaa1451197f7ac982bfdec71ce6c623dbdfe35b7d0ba0b2bb4e91972a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD557c3a71ce82b1a847f8dccd4c1978503
SHA1760243f8aba8ea4299b64697a52d3286ce90816c
SHA25668c1015848ef6dbe90a417bc0b4308a2033953eb8e9f736f77269e328c2ef1c3
SHA512854c12e3f87e50e358b2829cd89b9360ceff0ec7d0546a2e8a9822ce94205cc5b07898b90e433421a580df196a0b0689496d0cd7ecae8f6eba5192cffe147ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c271068839ded8c727a459136f589fa
SHA1e29d36d4b1e1327d99ea38ec3218b1dfa3aa0469
SHA2561a79e027ed67426f87757b452c080fc7e7dabb1ac2e616b6f1a7f50ff449453d
SHA51219f4d3aef87246de79f148fb4e9236320a9f7dada5306314bb4c32e8eef0d8a4b577f04fc967327a4299c2796253516ed5672713a912b407090936f983bf50f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD539990c61b9b77b3d1df16ce5ed20b07f
SHA14f0b65a82e3a5d0f1e32ef1d40d055453a7ea869
SHA25671b7bf43ce9dc2042064ec97d083e6255020ed6c9cadb90be228fc920401fc1f
SHA512d277b2333d2cfc5183bd394e3c2644a9124eb599462dbe717dc722ca7ace40aeef10fcb28f78d2323edefabf4818bcc46383efef3815253d1873ec64d83b976d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593406eba4ded1c18095058c8e0baff15
SHA1739ce6ec97f9528ce5dca053af754bc920b80151
SHA25636a01cb2b694a422ee1c761e72050dbc4112cbcca6cc9b085105c53580c0a941
SHA512392835f01b07d26d62d8a19584c5016d224dc8d73fd75dd8f1da73af5efa779251691eeeab14ae05b9ac3d6490b3dd690b7e07a99d0d9e280c58bb558b97820e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58f6e3dd5a95e4bbb51534bbaa4220c8a
SHA1a17596e2e2174af4263a59d59d55181ce527cbfa
SHA2569dea5ba8684141f65eb8050b49e242a44f6f4b9f7472642eab335712cc28e89f
SHA512b9589a31c3f823240e5fbaac0ac22c45bd188fdff5f5fe97c805da2bfdbaa544f40f907aedb65f5e117fd3f3827c67ff12705fcac219e9766e535ee6afc81147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b12f3b21428a5bb9a418baa95c47700
SHA1e1fc0d59909b6a4b35bef248942d18c37ff5b8c8
SHA2565cb2ea0295269bb92098d331baa50ef03720f48f3caec0f864decc00fcc616c0
SHA512b1980ffb4021a0e640c858461a20835f5d3e32e3166845511b716eb6a9ab3513a8de44149950110634ed9a76ebb8e901ca681c474b3656b08ccd88c91dd4763b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5639f965658a44e9a8ad77ea46dfe961d
SHA1be5e2f028de25c9be7a141b3c787686f6968b1e2
SHA256133d9adacc373c215281830a52d1aaa56896c6346c172f676ab9312d193ef082
SHA51237e7650e4f11b59aeb7be2b3dcd4769e3e497db5abe8cf03772567e8c14d0f48e9bf190b4da6bd98ff7d28ced5fdbb9194c28f2128cc36e2b0e6981a99bf3e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c9d958e240e7fca79efc0fee47754c0
SHA1a2e79866f71da9f78af91ee0bcce0534c333feb4
SHA256cc9241061c6899d829ec7de2973385f11644e6c11c0ffebe28d4099202b81b8a
SHA5126f33ee43d797899ffff1db00b8de00864478bfbffb6aa7689e669f339356e42e6ad462c6c776a89a17019c0a9f2838c723cdd054d5754383ad987c6bfeee6ecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51207bff4fd33f672482607923c05d28a
SHA14be2548da1f1b9b56e6acb39b755a0423dd57c21
SHA2561938f0876cccd1ead6a86a9f9833c55439743af0e15f6ffa86d856e54a1fbfd5
SHA512c2b45486e8fe52c9f2ed5ab95d7ed540ff719617c3fef162b38af4219f5fef76f84c4e260e72ac37bbbc87d786b47122de2146954513fa93b620d0b7e674fd0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c346f3c5cf0168fe76319093f7abe5a
SHA1414df56becec7b58aa1bab198ab337b64459d0fd
SHA256e0cbc356be0268ea25d20859d64e93b71baa564b584a4f178bb35f1d1b3b0af0
SHA512423ed28be3d4973a864368c4943bab14e9a8742e2984d1dc1aefd5a32f397d6e102619bfa8a9511d52a09421d9d30f2417e1ef9d6e299a99affcf0f96643121e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a3421a2060f0a90e29e4b24bbc241c
SHA1ca7010c5b31a840bbed26951a79caa2d0bddba48
SHA256590f5901ec16161e7fb5e2d90e9b752c1398c6ee9fe6e2f05b3114ef49e1771d
SHA512e11d114a152ab7118e26908b1f69a3e3bfb0cf7afd9bcd1f48e8552353c435dd711a3536ffa51a324da3a86130686c061991a5da9d9362e09d132b2c14a32de0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a