Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 23:38
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240226-en
General
-
Target
sample.html
-
Size
104KB
-
MD5
77b24e1091977a772dfb2a82b6d108c7
-
SHA1
8d69357003f0c58eb9b727e5715ee2e4defc831e
-
SHA256
6026b7597b01e12275b98f756d3db81d038b3223b0deadd7de9a46cf75459955
-
SHA512
56f5512c12e071b54d91578123a4a6e82636dd44857fda24de8dc4c86b0e34b260b916d36df9d779134b28de430e8bd753357b2d7d24f3356d7ac5e52bb58a8a
-
SSDEEP
768:MqUCcne6Gj1wRR9yBg8rXLreg8716SguDEFcT6lrIZM5GuvwOc:MUGARYROTreg8RHDE6TGYWPwX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000cac0c0cd76c9eb4a98a7dd4f4c00c4b600000000020000000000106600000001000020000000dcd0c2c7095610179bf619514a203fa787703daeafbc332562f2076a4af04160000000000e8000000002000020000000b5baab0a66466719b4c0d7c3c119069c9254bba07f70913901242eb0a108b0b22000000007a0061f04f532d6fc8ff83e19a5839aa379e1d14cbdc3436e6660661229a4f1400000001ad6fd2b23eb31d442eb069ba730f58b3ca606e86f781dcc7f4bab3325444249b62139081b9e1c9d72c15bae9a0290118557a6db6db1be54ef68e3f819acbace iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7533501-1EDD-11EF-BAF4-4AADDC6219DF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423274176" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 907d6ccaeab2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 1572 2872 iexplore.exe 28 PID 2872 wrote to memory of 1572 2872 iexplore.exe 28 PID 2872 wrote to memory of 1572 2872 iexplore.exe 28 PID 2872 wrote to memory of 1572 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d68b483ad0b35e64a5951c1cbec05e
SHA16620ea21aff51e92c36ac381335ac483c01edf0d
SHA256413d687311e75c6c7993166ddd4cc8e93a637950f08f00d25939c305f2ae5228
SHA512fda580e687952c65dcb8654fc45822409c528651f95bc9b543c280b142c1e148714e0dc1b14a3752cb4fb1a5fb3c96a7daa4204a19da85793ae21cf85ec81799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4693372a1dcfb3897b5856f0d669c2b
SHA13625fedb0a7c80aed1e91d11d9ee87d435d54b5b
SHA2569c658411eaa5b0bf72975e2a5f4e79275ae904da1019c3fd8a227fdd24b4e356
SHA512a6fdd29b32631aafe0b6f57df10631900b88915a48fb3ee95cf4852ee2388f41ac78f8bf4b291abafd4fdbe05d64d0c0a1f39830a40e9be8f4287e56e7e11f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5a1ac1923e364589c3516565adad1e
SHA11b74f3d19e05bb66a9d51dba3bd2489dd274d748
SHA256d73f83be7e5f89c929c02fbd4f964c262dd29185d6fa59db312d50e87a69f6ba
SHA5123a2e5fd0bea160c36ad8b8cfd66123a50736e3f36937f3dc6ffa20b303cc98e72a1a15d4f0dedacb1e7936ccd22b2c8412bd6924e3f755725ec2cd0e8e666f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2fde1519ef845c4228eb2a432c7487b
SHA14d2cb59ec867f10ada7b2386b0f15b514cee062f
SHA25614d5e291fe3ae86ce300ee7eb778776771066e06cfc50a5aefecf3a7b27081ba
SHA512acb8d55683f599686947a4f724148de0eab0113ceb84e9c6a56de66cf4e00126556797f7cfadcfc5d90c5d511ae4f98c6c01447b2e956f7a74bd2c4dced75a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab882bb48f107468aa42de020b830f5
SHA1e806ead5e34fcbb232c2e50f79f7cb35ff2a2722
SHA256cec07cdbf9af426e3c1f86fb08dd5f39355a581192dd6c3ae7405fe3d3de7162
SHA51276616c2607d1244006a32abaca02c60f315132e36538dda2b2229f4ab0e687b91e5e8ef8a5d4454c464f5fb8736cd3a2de7d095f191378297bb2092d69e03551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a1b578a2fdf82765df8692f9405370
SHA17f9bbc9bffee6d03f65469a2a1f44692433c440e
SHA2564bbec25745782d4a71a4c4a658a8d3603f95ded723eab69e138b11a1752742b3
SHA51203a34f11ad81fbda8b71f9003252afdecdbfd1158e4370ee9bf3ea9cb5c57ff8a3818d17d71664dced6182658130583ef805e68c1b5cc52bc2d71a94ab2bc2b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512cd8d262800563da3fd21a463a5dc48
SHA14ed0c7ce3236074cf988f1ec2fa2cbc805995e50
SHA256b489b0d722f1ceb5dd55415e49c329bb67ba7f15544ca6d14e3df1f9654738ef
SHA512cfe2734b6e2dc41389cf5c98d845497ccc7bc7c23db07ef81eb6ab15e67d177902a0ca170161c93d77c0db56b5b647c37e369d72d51424318e0ad9c29e030318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e4f5dd47a903a4db4c38e5b0b9c77b
SHA18db01218dc29d9d62d8e538e5e26203cf8bd30be
SHA256f668895f628b228a3ed9c908aee7b4fa6c9ab72ea8159c3cb73659c5608bb3b1
SHA5129f30a98b680e8becd600f62036de9f77a8a6ab2bb5c49c9df98889fbc2eb9cd87d89518b804f91b4480cdc35cac3d13aed13c6d1fc06591973808476bebc3aae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdd4588fe70aa3b1b74fc3c96b54387c
SHA188e29dc03b3896f5b09612613a94ce436ff063a5
SHA256425588aae222a88599999b3d632d53591d60380602b9c18cc4f4319f8a60facc
SHA512b8e8f3a406deff1b350776d1386e0bf95fd8859affe8f0cd260a4d7c09217d17137ac130524e13b2b43943ace1f191db2cc858ef55d3739362a7998836d9a4a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce8163160244f802d3e002b9f0e51422
SHA1ffff5ae8572963d6f86fad42248ed41f0d9fc01e
SHA256daa89c6fb113cf12947c52ef997be55262db7af4987bd30d60d24db25799cf32
SHA512ede57fa6b4bcc70bc5c2c7839df55677f63007a90d8a167eb88b063d33419045c848698871d53da4749073f3c586b846e0dc7ffa42923c5f345f31709babea8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb8057344726b9f0b4881caa04d0ebf
SHA1698139cded80ecabbc9ab7ff4f0cca40e52f9163
SHA256c8c985bb7a9672c25cb44dd3c8c6116bb4866f020eb0c6ca258d51b256035bf0
SHA512affa7268acd2da1870d238f112f4a7bc7da0e57195a37c33f567c07f3c8adfdb3dc3a31b67068d4dfeeea1039f762dcd4905bdcca1e6ff90a845f95a9bb7e4a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58165431a7ddb8f16fc428f75dc8b28a4
SHA1128837d5e875d282b09151017d9e8caf7ca6bb00
SHA2562443a639749f9175cd5baf4b2346b1ccb41b799186d622565f30173a18bb1bcf
SHA51246bbc8c2e6b00f7ecac839a3c4cc2c6c5edc357e3f7267495006a602a728739f3b1378bf89160ab1257e501afe9cd753982965cffd01c5cd66cfe7727b3e97eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56253739df72d205dac66806db1d735f1
SHA1fee042505949f3519c7cba15101cce29f708c459
SHA256e82b0dd3e5c2b0f0fcbc4dd0b495fc6fac1763ac660f1183c89bf6b0969c1006
SHA5120861924e9217c66769b0655a776e2fcf5887aca5cdd57e96c7b24ea2d6cde11b51026d1211376875ea642700788107ae560b03beccaccb3d303a7a2cee6ab4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec31ca37d3fa02c45618847c0a508b78
SHA1a544df94b42f8edec4a068168c55cd44c6fd0acd
SHA25642745c5b6d83fad4f743c67e9520122fca8d6a50c92700ecd58a294918ed120a
SHA5120fc5bf34e16f99b783ebe89d4417465b48df268188fc1cc4baadb2cc2a154bd537969c7b4912d053963c5a7def1faa06f436d5b6892d736a296562606ac29db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56142afbabec5e6a8d877061d53174960
SHA1ddc367946f7bd83c88a3286990421610ca694edc
SHA2563c9a7dc70514148d0e2376fa8b7a63b74459af6b965f5219a0937f4955174c79
SHA512f55b8affd59b7537bf979ed5b5d25e90c3d35286d49ead0bf1aa53acf1fc7e5560fc80af98804843084cb1550787eac156d8b836c7e0ef09cdfff63444b3d6b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c85f943b7b01fc788d9d54fb3a94fd7
SHA17ff43f215e7cd7d97a847f7f226c9d4365ed1de1
SHA256bcc5005f9f722a2b5ec8da61b4984c1d36d1bd91d24b518020e1fb3d1fb02382
SHA51256a53b00d591642dde0f8878834cfe829b21b206e5c7266bacae32e32e5a08ffd9b36531466f8c40259c058a90eba518dab6e0907506d985155d882c87b3ef0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531011aad8b5af17b52f96128deeb6b47
SHA1a10991e259db8bda386c4210359e6c2c43dda0c4
SHA2563f13b666c8ba1074c42207ab8fd730034fa3ee846b7f95cf7a8c33f065d5ad34
SHA5124e6011af4e64cf9e154639daa42dce90206ed26ae1d26b55fa32d42540ea3357a5f22084f92e36dd0b92c6335de9fb39391bed9dabe7d460060ca796c7ee81f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b525174000c788c5b05def104966bf94
SHA15cb7945fcad7b4ae062d4c8e0aab3111b94c6898
SHA256e54306336df8fa7bc6767898d38dd0eaaf68f3495067a0373ae9e98f17eba6c4
SHA51276eb0b3c622782d110f47f7edc7b4d0afad9e66dad518827352dab0b656ab8efc123f64c4b3a9d5c32f816a010e43e6163cce3784572fd0b5406fc89fcc3792c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9e8562ec2a87fcf6ecf1727103eca3
SHA15dbce1a60e026f88c7e3a7fc8f45edc15931b39f
SHA2564b7f2c9de8f763b06046710a20c434c8ee528a3baf47a4b0ea37f8cd4938b775
SHA5124a76605283bc1c88f92ec6336e9b922e1788e132de82fef3a0fdf3591b72c91ef45d8bdf223255a3be0ddd0dcc2ea310adf06a488d542e0143e22403019a826e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b