Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 15:15
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
file.html
Resource
win10v2004-20240426-en
General
-
Target
file.html
-
Size
312KB
-
MD5
b9d7e10cf91890bcf76f761e4f1b8381
-
SHA1
2e37244e2bda4711f0d673b99543234145ab5366
-
SHA256
d0e940e4adfb0a933259364af38020bcef6d0315cc9bef5a4c00dbedf6216d7a
-
SHA512
e71b55b629122cd7d74334b266103c6ebaa8ba5229be4c931d7479a717b970df3dea6c168ddf934406d2205075ad53b1bfa6a72940ed39cfd5ece916f28ca10d
-
SSDEEP
3072:JicgAkHnjPIQ6KSEX/jHvPaW+LN7DxRLlzglK7V3n4:xgAkHnjPIQBSErPPCN7jB7V3n4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0af1c8f6db3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423330444" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000023a41775cf2f5b4793f346d0a8c9747600000000020000000000106600000001000020000000c6bc29260cb1eda7961162be4a87be6e817aaf9a73f018f49458566c9a2d972d000000000e8000000002000020000000dfeaae247d854c690d32a3fdfa608303a295b4e2f69faed17dfe2e5512477b6e2000000089a77b29c48fc4e5603a8664d09761a78df7709d1cc1d6a4102a6be6d21fac424000000079035f460a2c609cb8e25eec82519de7063b3ee81c0ff73eccdde5af6eb9e5449eb3db4072e49aeff22113137eccf90c9488fede552867221a7ce352e1470983 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B90BD2C1-1F60-11EF-9966-EA483E0BCDAF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2528 2172 iexplore.exe 28 PID 2172 wrote to memory of 2528 2172 iexplore.exe 28 PID 2172 wrote to memory of 2528 2172 iexplore.exe 28 PID 2172 wrote to memory of 2528 2172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD59b6c455b95c58472d5a0d68b3cad292e
SHA1fc9c1ab54596c39953823ecde13f791e84dc6ca6
SHA256afc976ebe0063eb559dcdd7a4c591443e4c4942dce59253f1253f0e600ba85f1
SHA512b209b3cf380afe29158924f32f66afdef337ece5ecd209fb18d58a863123fb045d0fe7868373b8a4238e68e64025c2576bc4ac0b4ebbde6dd93e204e3bb788c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b16cbf21b4e77aa77c2a0b13828f81
SHA1df96decc9986211ce0e2322fb93f612e883cd2bf
SHA25681fe2eb44b43e801b2ca8875369384ad2ea07459fd45a42abf31983848b85e4a
SHA51220917ad158608598368b977ecd1bfd788aa399fa73e913825f7504d7a9d9477049a9fea28c67b75d9acf2ba83b346598fabf8a32c226739135ac3a8cdf72d3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f685673743f0bb6a33c07e5c0386040
SHA1245e3e8d35792c351c07b5439f1b117e954964c9
SHA25610cd5a164e25bbb84b321d45f93b25ce3c32734dc4e43d8e65024f31aaec9d3a
SHA5125760b967ccdcf811023e8f035a8830e2244cb247cfb55e85697fe7fa077ea2e1b5d79b42393bb2b32ccd9e928b68e4441a9e9ecab6d325fa0a32bb044437d932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5143f2f75f309e86da7c3ea628b057ffc
SHA156ef5e3d8eaef6dd284607d04dfe6c6ef2d27211
SHA256e98cc38659c3041fdf8c756defc2bdbec4b74e9fad1962fa3ce4942f7f788f70
SHA512d4039bfaa0ae9b42e29e89ac9ce3dacdac8026b0bd5e9dd9cc3196595f275850d6b63465c7ea1df5aa0b4acdc2a7f4630382188f080b8e94de5e9d3b467a76bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1cecb5db4b4065832b393edfc073787
SHA12b7dab8c12d09b661856d1afe6da1e14dedab38d
SHA256908f91a6e2ed33fa88496aa78bc393c258cbb351d314da2768e935166617f64c
SHA5127eb38fd3d44c8e3bea017e2d27e759257289701acf6e73ee7c0b2fe4a3b496fa7c4ad322b9d461d3d0d216dac5fba3fff26d620a7a6c98898813c61fea149cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578272c00aa4b35eda0a50bbcbfd6d28c
SHA11f852c3e72cea7acec771b2798001d6eb29db0e6
SHA2560c1482bebc8605475b345f09cf79366cc1af422a798ebe9d8cd9ac63d965f183
SHA5124968daf8508e70fba0f82dc1d1e3d35c8c77f3dda38ad1ddc01817e46449bbba419fa2c6a6c54f2410384d672a37d672f52502327713b9b2651eff7df1f4b4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5328e06482c9d1725536df18b33d47524
SHA1cff349e6a7f380ed012d6317bfecd4b3bde311ad
SHA2563bc1b9e0c496312998b5f42c004add0957ed363b4598f94fc1a25675564d951a
SHA5126b5ab87af30e0d2cab63e39cce3eabd0686b57a977fc10727b06fc154f6b05dd19fa8f4cc80f104a9b075bc7018ed393ec77772c8bd4f9ce1bc78eca3fbc7ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51834c2395af466d16bfd2da37ea36147
SHA13c7ef7310488ccf1d03b5d912468dbef0354f50b
SHA25672d67590b2a2f47d169e6e1963704253302bd4b41b7b5964808ffbd8a2feda58
SHA51251beef4bbb78f79ed4b70ea0878d8a2238503b88f8a4cabbe9bf753c1b86f8a8e5a3115dc4144ee12c20524be5266e1b31cb088454e1d9495d3d55d41a9ace6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40020507c0d03bee93d1bf44aa8ba3e
SHA1d2f46526179a6d1d55c9c07acf5a89e3bdc29870
SHA256fc586af6c72f34c289ceafb7c8e85cdd16953267246bc31c479251658e23285a
SHA512c337a154929b880b1e49391de0721d21c3a7b5e36f41e96f252bb859aecb9a966daf91e9a3b0318a58884dd1fb667dab2e88d58e5161e9346a547489f190a6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5080a810ac345276941786668e1419a9c
SHA112001800545f2ee26bde6a91f1887f9dfd00fcdf
SHA2569f3cf29cd9465019b6700e168c229e711d6a6f006ff6de888713b552bc321a67
SHA512f63d607fe0ebd5c3b9fb2f7bc684ecfe6b95b70799125809861a4d08d4c86177ca66398187eac2fb149fdd6ae1e479b42d581de793aada41c519232c0a84210d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2220a881c7236ed04815c3e6e73d96
SHA1130c435146b8578e39fcfdcfde9df89848263a72
SHA256e231a77bd480560edd4b6b28e025503a93e399590cfab94f7a2496a2c812f609
SHA5122eb39cd44872b03e1da83f3f74bc912cad9c469bbb4beae98ac873bd69540afedabcc3f59df47a7154b54fa22f8bba478e1f4adf19e40fee4220c0e0de05f8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e675b8e19ba3ef605705bf45b502f52e
SHA1014379d256b98948c8985ea1f11f37dce324f1bf
SHA2562ed24b42fd13a4e084377ef3f07cb53674560e6cdb9c8ab287bf83a9d5e21018
SHA5122bf50068c7164ec13ef7eea5858595f30f7c7f152c23fd6e2530287dde03e32c448ae81c8bc0ac92e3946d7dc9b10ae1442442ba82d0db217a14d53f9d715bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfe8df715b80c622fbea1657c45048c8
SHA103e3913e58d0895c04379c51ab1e74cdea7a23d4
SHA25662d6f739b48f00a9048ef237735388e338880c52eafa4bd4f042f64eb05ec375
SHA512768f459bd1e28f9efa724a91e23226abe30598233629b03bab0a9723ad6448d90b21d360b6fb0fb082403a6300b87007c0e8af21e2f07cd7920d76e9e51bd583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53139c3619333a203755681c11546080b
SHA19dca6c362a5668c439f67822913d0b59cf124799
SHA256e29a9b3349b670198eeee094c451870a78b05c54d08b2732ea2370744c9bfa2f
SHA512a44e64af66c41fe55ed7400c57b3ed8fa0e60e8c0a27cb6b494aaa8360002fea82968132eb4c479511784ceb8ffaac22d87b679ad122e35667fad2a7555212ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af2969ce493edea8f4def4f83ef9bb8
SHA1220fb90037d0e974ff974b01fde440e97dd2195a
SHA256c478f025064a659f503fda0f933c437d755d32478b2c7686a988326e1cc51044
SHA512eaaa1e27434c014f674cd2d85fa2909b0cecfd8f8dda1f23bc75215b01cc0f4609f3d5a4b814b700226fcb9efaa04cf6286fd96095a96eb78593307478f43568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee73ada5384ae66ed0c30c579c602c3
SHA167f4db358425357925b11c4aed560863d24bead5
SHA25639beaee8ad0d329388f5eb4943c301de850753d95c7b4c4d01366067cbc60511
SHA512ef5d882241e714cd03ec1b5f01d60cb488be937a118a1f9d7f7dfe3e62f0a48e8f80e83993477b58b448f6dc4019e9ac138425a3a2e74006be1ee175d6fb7416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58bb9e93e26211387e2dfb91b4984a26f
SHA16fdc9be1672021fba6cda7afb6d0a6586917a3c5
SHA256df4f5b16b0843e090e539a6f955d5bfc21ff7a27fb7c64055eca35807696afa1
SHA512a4bb29deb4e307e0579d7d9ef6420e2c57d2a5017154ded95a2ee0f74e2f8e6dd78935620c19e5df5f747fae073b39f0652c45e97c68244a3c9d3f8537f6d9f9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b