Analysis
-
max time kernel
35s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 19:08
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240426-en
General
-
Target
sample.html
-
Size
4KB
-
MD5
a738e53c248636f1d2001ff53e44ee52
-
SHA1
1d1aad2d584afdfee1dca89b0a9a75ddec23d6f1
-
SHA256
128871f52504904c7478fdb28580397d03794fbba3c08b4ffae3ffbf50e54b2d
-
SHA512
3d191fdc192cb0e66d8bff1f0092e123e2b21b41fb72a9f145ec081a467ee4ebdb4dd4d4d8803613635760894f409eba29dadbf63f68aa2c10e84380d590be09
-
SSDEEP
48:0CD32i2qMQ7T972+emrYecHuoigij6Gp6fl3MAM3pS2DwffF/z6LQFnf:X3MlsCPzecHuL6fl3MX3pS2D6/zEQFf
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{579760F1-204A-11EF-9A09-E25BC60B6402} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1029742e57b4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000077e99d9af87076479a098d28737cee310000000002000000000010660000000100002000000006b9ae6625cb2b7b99866b559a2f0b9059d04c4794f4608f94ec217d3f68d0e9000000000e8000000002000020000000c865f3688971fd806ecf9efbce6797152be66878ecf5caeca4bb898657c8b3ea20000000d2252f9af1bb739f6d4db9e4ef52f188191d6ea6abd8828c1702dc11ce3e91cb40000000af5d5517966541d5a0d677229e0c1e115e5844d7cc8314da0da10dc0e4e1b6b1ef47bfa2031bd3c407fd37f021d5d6edd69de8fcb62ae91ac142aade7c27eb7d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2556 2656 iexplore.exe 28 PID 2656 wrote to memory of 2556 2656 iexplore.exe 28 PID 2656 wrote to memory of 2556 2656 iexplore.exe 28 PID 2656 wrote to memory of 2556 2656 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\sample.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d8b73afb5512a8cfe6323a8b6ea70c
SHA17ca835a09760a41edd9e4a330a5af4cac466b8bd
SHA2566ae3cf44531c33f7418cbb04725ba0381ac4c5c7ee5defbf2076f858242faf98
SHA5121974359f8b1d54dac35743c2de0f04a43802dc086cb54f8b96f2813bb19df8280ef627170faa866f0e0b208a4065dd951b2fd4d02996471ba8de389f4cf9ca17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e77e1d6a0e19feacd124b2613517ae19
SHA148843de90c474393fdde42eabfb218ab8292338e
SHA25642a5bfd5dc376f99c173aa6a0034d0d2a61d3eb74e157d020ae5e0355c08462d
SHA512ee4c680a81cba302d83dcbaef4887a2f2c64d21ac3510a8b5509e954cab24acfa37ea2b24a0f92dc857b563b3922f59849b4f89eaabf4887587daddce352be0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55821936397490bba105dc9ca840ea4c1
SHA1615eaf835ab3409e1a2af98d80456647553cab57
SHA256b1332f5f35311e175503025e20573fbd12a482059d0378bc321c05ca2d367bc3
SHA51228ece2e36fccc86c383687378f6e8a9ede31f6cf0161cbbba7c9edf16f1835d6c86179d42c82467f1a9572004e11299fe8133fb23c36894699f5fda7bc4b25dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41dab2fc1832922ee0b60d3909ceaae
SHA134ae5868a702c06071bc49e61cbef9d975b691d4
SHA256f8ef11f4d0172d120831d75f32b6ac8c702375898e25e2c79c4a8c4d7bc78988
SHA5122d6acff219a315e81146de2c4c55a7242e382726a6dce1c4bb3d50c703cb7ad80d26ae180eda2a734cd240898f5be9b852f55eae10845ad0f2e79b7f30a37fbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa941db8792469bb0a3795c1d7407916
SHA1174b057bc8d12c4531dfd645db17f93d5d322b6e
SHA256abe195f6062fec5979f7a4529597afd8d12efc8839762be4423baca4908ec5af
SHA51211bdf5b15e50eebcc5ca9fc6764323d3f52a28e15ba72b0ef1d77bc364f5cd1d87916f8e938f549a1f7903ac57ee54cf859235e68caa9c9dfc5cde12ad06de79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598c47d44aa19a63c0b847759ff2502d5
SHA17d27c05396e7c676dbaf308c67ee16b369b5ec60
SHA2568dae94b7666649c43c9e2842ded49eda759e22c4fd72ea512dc893d4c2ed23ce
SHA512b302d3caf353106de74c4babfd61a3514475ff9d5e64a68f4050852d074ff0621a242c1d55dae51b7d619504360c3f0f1f825671c47ca564b961c24c96a48048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d006a0bd4a63fa493b4c5c5aec118c1c
SHA1202be9faeefe5091d0736edc93eec6e3ce66b0dd
SHA25652b53c46b041df7209cbc495dcc2a8e8b6204a46872f9f5df1b46fcd66997b66
SHA51299063848634900bd47d2c5365e240e93ca5501e348865f7ebac6719541ed06b1fb2d6305b05f0b6f07e55e65b285d791a5daac6b263da819e3b3da2176f4be01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e73a4e745df68bdf119f38f09c2fe19
SHA168321b85d201f3d54aa9115e6baf9a32a47add19
SHA2569c144f480194d80bebe91871bd36b160ebf224778aa8a8a560d563138faf2281
SHA512af2d344badd1030cbed2ed2532b1859d54012fddff5c9626ab985162879d0582d671de01ac320c0ab831ac8787c2247c829a116fc414a903273bdc8d9aa6950b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6140988ae77bb41dca33ea38f22292d
SHA1af69b18ee1430447f760164f15a7a68add03dc05
SHA2564f207a1789521661698dd771a50b9484052a8ba07f7cca8225ecdd5b1b77790a
SHA512d50a2a171c8eb9d8d4542a50736a92ab299bf4573f887a7b746af09265b3645026bd46418d43ada6638d10345c47d4533d4e6cd41afbf2133ec37ef2f0d10d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b5b6a3a13d1193b8601e5e37b3b2f5b
SHA1c2a2efc1a54c8de1f4089898510517860ad54b26
SHA256736448b2fc5b0725b35f63a68d4040ed8d48b380ebb40556add475fa597253a0
SHA512925c86c65235fbb6ef5c3b0a935c5f7fcdb5723c59fd17026db896e06e22adf06acd45576c3ea2807eb9c71dcc169cbed133bb62c6dcd84bb854590b32bdbb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af48b6b38c83e0dbbbc44222698a1b77
SHA1d793d5bdab3a8eb5341cc95b82856d0df32e05d4
SHA256f1c124175bbc7a37f6372b9dfdaecda43df591f86b8641b63c73a45280a65fc2
SHA512f683a3076306c8b9f9321ebdde7ec8dd0207f194212cbe3e53fee3f2aae4da2c593b9c93d1a21dfd12840fa547514a27d5c375a48521d4383b721bef4504a60c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b