Analysis
-
max time kernel
71s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
.html
Resource
win10v2004-20240508-en
General
-
Target
.html
-
Size
612B
-
MD5
e3eb0a1df437f3f97a64aca5952c8ea0
-
SHA1
7dd71afcfb14e105e80b0c0d7fce370a28a41f0a
-
SHA256
38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
-
SHA512
43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{245CFF11-361B-11EF-8FA5-CE57F181EBEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000c75e42d0ce25b52a62ca99c7b3dcacc0ba6ea5e40eac2aabaae0dbd3da0fa2ab000000000e8000000002000020000000d297a0c451c90523256a1aea9fe35d133455b0cd7b9c808329bfb22ea49c582620000000e9268fb068035154a543d999a0c3695440ec74963e73043158c89f14eb9448d24000000046a8d9d230308fc6f30c770f5fdfb22d86ac8ee7c46e908a92e5a9ef424e9254ae85e983af6928f32c7345d626503058a7af35050f9772f27bd7d268a3e8a750 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c7eff827cada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 408 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 408 taskmgr.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 1704 iexplore.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe -
Suspicious use of SendNotifyMessage 39 IoCs
pid Process 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe 408 taskmgr.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2552 1704 iexplore.exe 28 PID 1704 wrote to memory of 2552 1704 iexplore.exe 28 PID 1704 wrote to memory of 2552 1704 iexplore.exe 28 PID 1704 wrote to memory of 2552 1704 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\InstallRepair.rar1⤵
- Modifies registry class
PID:1404
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e19f544be3ad79a7a54990c1733a38
SHA1094521a7c221dcf7cf4841458a355bf83b5c352b
SHA256dba683863234ecd8bd2a6aec8e72af44569cd39f1afefd32f124bcb16fe44989
SHA512f6af947b0aa7d1368c7b53cf111a808b90cc5d725af35925bda0ae78d85248ffbcaecd82e139e1745a1f83d6b40b2775d5697f86a4c16cec5a15704efc0e5be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cba3b911ba2da1951a52a6035b05bc3
SHA1514fc38f08f275101caca6921fea6c22cedfd69c
SHA2565bdf6ea691fa76b37dcd4beb8fd35fd2e0565b2adf62ea5f66c17f460e366a1f
SHA512fa7874a05f3a790c9ff109a2509f18081af41ba3b981ef2dcd363b67a89fca2a1e732157cd034d54ae0f411724425edac0c6cbbc9970af5ff8940bb282745391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cfb723a1cadc6580dcbd2c47d7ad39a
SHA17d29637b35eda6fdc38591bff2cd516e8c074425
SHA256b8f198120e79ccaa2be04ec33ffdd16438ea57c12c92295cac772c1751c6df0b
SHA512c39f24fbc138e3493af8434a442a97d31e4fdb0b5665d83a1374e77cd7a44cf367249567e4434035ebac5419cdcb7e88c5854e8a61ad7eb6a03e60ba4b394daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53952d8f0d309be36a07791649615d0e5
SHA1e17442d604e7216e547de77af5327fb5d1ea4c7f
SHA256814502cf63c4105dcd9f56cc66485f82ce3feaa1507981f01d3a6a51660a2227
SHA5123c456d69c16a748874c427d7df2b5278e726f3359ded623373c3a9f975af388aab0decc7a234e95958205733640880611ade8b72bcf5de77b134e3bc8e8d7a00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe230e150f7745e56ebf35329ccea31
SHA115921326cd56cbf8848943a5fea3599c2ba97a21
SHA256b42a4875bd0f4d2de2db8652491cc0b90b0fad899d6ce0b9296805e6a3d4e740
SHA512a593f1b4fa6c07331e49049bca485d798cf34e33638c30cb2bad9c65260b3bf4b6f4a2f2984db017c90ede7141106fb41705302a94a7a6e4cf29451c80cfcfbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aeebc5a0d5b4e572b6585a474b41211
SHA10fcb0ca945fea7103ef50c6e76cac15a1eec5f5d
SHA256c5e640f50f9423557c53ddf3bc652deda184105382e9be53a95d90142d1afd40
SHA512a200a5bd4830ffad6651b0a2a2645ce8973833802739104125c096198d3f7e21c9f9fcfbc3ce9e266b0349a8f51d2fe88b5fabfd3b2e1b64bb154d52f2cf20a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a58530d3a513d344417f8e5b8a9a439d
SHA16255eb1e7a1725dbeb74a00b20d644496a957df4
SHA2560181b2af752629a28a7de24b797ea216267f738f06815f4ca2a24abefc016568
SHA51210e84f3b63e29e24ff965e38618b10ab4fe8f9da239f6a528fd1aa05d8ea5a012c5a2421cefe4b9f651638fc94c938525b00e9d42112cbc0aec94fdebd3eb267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551d7bf6cb9ad294a03f89e9680c3faeb
SHA1ba8694700dcb24253cf155ad6f25ffb486987b94
SHA256f019a4a05e6336c05a4a3ecd39f1f23f2a56cb10d4243131e062cc1b0459584e
SHA512c6a2d76c02e7f4e72a90321cfb538bb49de249d29b33b3bc67249c49ed50ddf1ceb0ce96fa9b20560edfd72319c9b4e9499397c6ac52e0db68b8d4cee39e9dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ad29ff1ccce2ece241c08661a4867c
SHA1140da4c295801e4b5efd34a55eb4e2f82f5873a7
SHA25619e955330f1f0e24d65e90cac59b3b56c5ae42823c19e7f22df767a32146fcb5
SHA512f90a8f743ae6c700576f0e7f46dce71915401896b3c1f21c501c7aefb574fbe1a05931ee230ed19fb02306c539e84f96fe1bc737fe1ea0eaefcbfa74276b7e20
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
16KB
MD5f22ce52414a0a12a7122fbe2349564f3
SHA1ba6a8984d94b587d3a669407d882ad2eb678bd8b
SHA2562a89020b93d1a250427ecb7915013f6a1d36bec0634816377144a054ba8416b6
SHA5120a66c6cbf99fd31c5168589aa81520cac97cc537c8182677958813bb06248d5f292a2a4bea0826d2c118258696765c6f9ab7d87b451afa83efbac1a2cd2f667c