Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
fileo/verification.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fileo/verification.html
Resource
win10v2004-20240611-en
General
-
Target
fileo/verification.html
-
Size
50KB
-
MD5
44d4e9658e284f47fbf7593c8e0d1d01
-
SHA1
bab8608dde17dee31ab59654f1cda8e5abd7acde
-
SHA256
f116425e9d5590c4d2786b574678076f7592e16e1ae784d3e5ef3f11e311548e
-
SHA512
dbab090a594542fa9d047770593b3c340087c5fe1840f0d34e99f5b4802795eb8ef9b284fb23b2782bbead6c97593c9dfeeed72f069b7e096c20bb606cc13d38
-
SSDEEP
768:t6l9RXyAZqpzaPeFOGvRc5F/TeLONNJJ54ALpAp+Jnpf:t6l9hfIivJNJJ54A1Ap+p9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000054e25c3937dd594681103e3e283802b5000000000200000000001066000000010000200000007d1aa544c7f88683b02655ccd5275f735487e52079f950dc3a74a7e197c1b2aa000000000e800000000200002000000006582ad06b8e8926c07689811d4bf73395339208e019a42d5095b18d01f73fd8200000008b79dae924860a28dbc6e7b61c97c2b32e01101f2e2ba10e5a4188990d0fc2164000000069e1641f0b5b534705c3febace7672ead975baca152ca0b273b9148c8370841d62735c7f2c5ead2dfdc4ff055069107787648f41aa32ed9967112dff84ce7ad3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424503196" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40501E31-2A0B-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 002ece1418beda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3012 2168 iexplore.exe 28 PID 2168 wrote to memory of 3012 2168 iexplore.exe 28 PID 2168 wrote to memory of 3012 2168 iexplore.exe 28 PID 2168 wrote to memory of 3012 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fileo\verification.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fc5c5413936ae8da49d2320b8019060
SHA1154858c89e8e03e6a1ac707a65fdff368f52e11d
SHA2566062299fcc5a5adb49bb4970eb148df92e7a10c6b4e644e0728050462cbd9a14
SHA5129cfb4edca346cdd712acdc44410e0388dd289cc1171741c84a4a030b4a14050e4fc045d37bdbb13850abf1b2259acc3b57f71566a103b2d9f5bbd8f1002a2f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f2bb71020d6f3f1e958a0743425b3d
SHA1aa7e70261bc000586d24069ca7ae5b393b939b82
SHA256fe2be792e50c5d722a2ca881b30938919f2610408b44dbb2d6222cc15127b07d
SHA5125c336ba869c723ebf13c7599c97248ae2bb5147678b46d3061d763a33664a8a48b85e08a7e207b569a3032bc1d845db30bccfb8ef1d760528f0c2510e2965afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57293a3aed6d73d6406039031e720f096
SHA1200cd63d262acd1d7d233ba986ea1068b9a89665
SHA256071258c9e454505b254994025eca13d9161ba14bdafb63c25de89c9cbeebb202
SHA51290cde9ea2abe4d1b8a1201c35cf10fda37130e14c8cc289573d2436157b5d0463f14ab3911b0b008bad82ff3478e46eaa27722ae98d98656b21c2a343db2bca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec4dd885b33c8feb8a8632135a4db65
SHA1d2e68b0666cecfa7ebd402a3e30fbadc42ee6b65
SHA2567f2c50604fdef497a59c597357697d10ab200bbbc8d466182c804b9d7f6a2458
SHA512500875d3c45a5fe7b8fb13b6a33b4cd0291df0cc7e628a60c1760cb4367c423df0c3eb4c0a2eb5bba2bf597abefc2dab93b951c30e4ee66da3b0706cdf7f1c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c462e39c0495fbb7b62183a0470bd77a
SHA14c7b2b02db85bf8b9363e79a5a2ed68944a9faa3
SHA2568dabf9698fac9a0265c1ec0e35b984c6ad76e00ddf41bb16fcc0cc1cbba031b7
SHA5129df4d24d756a96690863ced4a9466d653f44b0a8221c0257f3b866281882f07d8af5ede5158bd0b4c4090a9a8797050b263c5f4066134e59a97fffff998bbd98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571196288103ab969750c61fe1ed839ea
SHA1917a60dcf7390ad7c0e87bef8bf334cf4cb9f149
SHA2565209c5cd87bd1b0013f5d536a78f762734be10d5c7c8fed097c18493618ea241
SHA512c8ac1329684b93ca28a0cb29aab0c3fa52bd4eda472739a25b5b60b0d3077046366260685164eb74ac9af8590dcae77f96a41de692f14aa371093a7d1f1d269c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5794b3d8c754fd2f9665d286fb817aa96
SHA10a37eb19a361ae941739cbc4f30e84e5086ca68a
SHA2564b5acb321d642e03f4bdb7dcf635ec2dfefe0eab8d2d463f87d9b7976a4fa888
SHA5123f466fd4792be63692b43e2170f9e4d82eeba67945ec568a8899cb300db8f258169a032d1ce05d965525539608fa716c555c5fa1d7be302595dba1e589af1af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582460783137d4934d9419057f1a0ef2b
SHA1b46c97be64b84d66529be53696852c8a3d0474b4
SHA25633d2f1860bb16558b9742675b8aefe06cc7d111e751c621362c0425de8153bfc
SHA51215132b8b89942e79bae8a766a8c42e14c0fb452198308ebac61ecfb86093bcb8ab1aa970b0d6cec6f4a0d1bcf9edd485fa4b886b6fb8e73e3a38eb6d145b7f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf13a5232fd0cc9416b7177f226b61c
SHA1a0f2fe25b3c74dea9014bb96517b034710c1539e
SHA2566b3570be28450048e387eea1955a1b00740e552b22ba57cd20a075b23c7a7634
SHA512188e4df2475c60fcb3495db984587557b4904292fa0077f65ffb4f340a51866cffe808e0851a9d86d92a83201e696d119c2358c033752a0bbe5817c780ffa1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d45365684a1a43723b9f9dd8a6ea46d4
SHA1113e0df01ad0b14b056f018b8ab1a9740e7ec629
SHA256cb8a8e1513ad2a37ce19cc5e08a6c5c7bab725096778f13fd2540ed42ff4bdda
SHA512738d99d4383c9a1fa0b9ac0973b3cbbcb5b185394ca78cea77a54ea4adae39a62f1bf5e3b2d0ddd69ae68b029e616176ad7d3c1d7c722ebd2a43638dfae1c220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5602d516348adf441bf98180f66ea6f7c
SHA1b3ca7956cd6ed9c65ac59fe473bae71c526b542c
SHA256b8f49fba9cc6c0d645cc00486d3c7ea5d64f95e7ed67bd61491169ebe12819a4
SHA51295552341b57d0eae18b408c7eef34ec69f7c47e0ca175314a239ba8424cc1b12d1c66aa23d40a02a49d691462d873c84417fa905f513abbff717378b3f291ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626dbe77b48cdad0328e66cbf2c063da
SHA144b59a481fe211dc17f090e0d027c062a722e8f4
SHA256194183df91713dd2afac26d2e2ea8e993388cd68118c0267cbd012920f743fe8
SHA512726d524c0a7d1a8fcc5050b58c45de0a0214ef7581c2cfe36289a8b5be1410a6861bec7289b1ac28798979455df6a3cf9782d5a2e22f64e90496d76a6d4417dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653bb81bcb7d4f5c469107060a463139
SHA1975d209ca50d2a40d2d33c0f1702ddafe6c1b3e5
SHA2563fe4a9f0a01df14a0b7de4acfc90764295dcb4e2eb74fd2aade0a1aa6f8cbd39
SHA512c6c7379cc70c0d06aaccdf4dc9dd71d4982745dda5839f46d6d77d5cff20aff789c45ec305c7c67fae6aa333ee4c98a2cb9c7f8b9045c24cbbaaab11299bf42c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af2e87377389006e88290e8803f3aa7
SHA18b04e888404c25477e437cae97aa4c22f6c32bfb
SHA256e78f8cddc67ac735c79dfd2e7f2c4735dfd6f01a1455cc6681ab2af814b9c89c
SHA512588011e3fbdf77dd9b5c5ff09920e0efe63a30135f8a39b74bd3a3dfb9054a4cac07983877f6854a4b4411c95f8dce89eb3bf7607b812163bc73119311887d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589fbd652cd6897bc06d98dc9bc6cc3b4
SHA141841e9e6ceaeafe13229159030f11a50dfd5115
SHA256fc08c957e21b59eb8e70cc3a2e3f269c4908d7d2e0568af8bada9c314a0e8427
SHA51217e00edcbad88a056260e52765d8113b85f7c868bdd47e1fbb16d3d7ede7c0ec8f70df5bf6fa089f5227ad598f98309ca53c28e23ddf8253b111081764e2a1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502749d7d000e22fd6655dc2c745acf51
SHA187a2e4eca84388e9a9230229ce76e7a5cded8d5d
SHA2560aa7cd8f3c963076b996c3309b0df3bfe8122df4d0b1e514050b34b149bca202
SHA512a99380472aa495253c2baaade0bccd36b12a7e48c4883c41d129da244a1ac7e45e367d659b4bb1b9cc0a3c91dd5cc951c4970c9067a20df39c8a967077c6e388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a506599af478fe7305eb847e921b683
SHA14cf5fb0841ee596a0842de742891f0afccbc01d0
SHA25641b964fb6d3e724a22a9b78c7c6812f09dd90e40b622210fa24ef3726d319627
SHA51272b49806e62b8f67d9fce03cb0952978e2249b727ef18f5e681bd43c84c9d9810cd831bc970894018e301b935a51a2873c641a360ab5b92f9bd6b81835aa3858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b27bae2bc9c9cee7d19434b4eb81241
SHA11cc54612a468f20904021470bce799c37575476f
SHA256e4062442e15c3868c8e4699f1b09572ce585a04b4814481adc442ab0421d13f8
SHA5121ed4fa70c8a7fbb1ea1a06a1dd79436c3e183b18f1057f4d36fc170651ca22118898e4f05099b2fcf7d3f92a4c10dec813a1c24a830c116bc34a2f4569b67a18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb4f49fb9d92e5fbdbc4a6e90dfad219
SHA194a355d90c223e98cf6e630de27dc6e6bcd68025
SHA25689a46b5f39dbfeb845676697bb7f16d2ccf1302418240c85114dc7ad19f5b7e2
SHA5123bfb6520c0f38956a9b97359aee5a7bc277ece41afe4dcb800d1298b2faa459a0e9e2d8f7e083cafe848b63b13589bf7314d48286ff5d126db878631c718a9eb
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b